A ptrace-based TLS 1.2 master secret extractor for reverse engineering (PoC)
☆35Mar 9, 2024Updated last year
Alternatives and similar repositories for tlsdump
Users that are interested in tlsdump are comparing it to the libraries listed below
Sorting:
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆15Mar 30, 2025Updated 11 months ago
- ☆10Dec 8, 2022Updated 3 years ago
- A collection of awesome readme templates to display on your profile☆20Jul 25, 2020Updated 5 years ago
- 用于检测网站是否使用了CDN机制。☆20Sep 19, 2020Updated 5 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- A simple cli tool to monitor the file opening of application processes.☆31Jul 9, 2022Updated 3 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆28Dec 6, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- scripts☆10Aug 25, 2023Updated 2 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- 中国传媒大学网络安全本科专业课程课件☆29Feb 22, 2025Updated last year
- Single-threaded epoll-based concurrent bulk whois client☆31Oct 31, 2017Updated 8 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆49Dec 22, 2025Updated 2 months ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆38Jan 15, 2024Updated 2 years ago
- TLS Examples in Schannel and IO Completion Ports☆10Jun 21, 2022Updated 3 years ago
- ☆11Apr 12, 2023Updated 2 years ago
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆49Dec 17, 2025Updated 2 months ago
- A program to map out SPF and DKIM records for a large number of domains☆39Apr 1, 2015Updated 10 years ago
- Open source cross-platform software virtual cpu in userspace☆12Apr 2, 2022Updated 3 years ago
- ☆22Aug 29, 2025Updated 6 months ago
- ☆12Jan 25, 2018Updated 8 years ago
- An insecure and inconsistent DLL injecting extra sensory perception for CS2 using ImGui-DirectX 11 Kiero Hook☆16Oct 27, 2024Updated last year
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- choose demo☆21Nov 6, 2025Updated 3 months ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- Kali Linux Tools - The Collection of tools.☆10Jun 26, 2020Updated 5 years ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- Repository for the Oulu University Security Engineering course.☆14Sep 12, 2025Updated 5 months ago
- Windows日志清除工具☆10Apr 3, 2023Updated 2 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- learn llvm from scratch☆14Apr 29, 2023Updated 2 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 5 months ago
- Curated list of free courses & certifications☆11Oct 23, 2023Updated 2 years ago
- black Ip lists, dorks-collection☆16Updated this week