Stochastic Traffic Factoring Utility
☆16Nov 5, 2016Updated 9 years ago
Alternatives and similar repositories for overflowd
Users that are interested in overflowd are comparing it to the libraries listed below
Sorting:
- Syscall Firewalls for VM Isolation☆11May 31, 2017Updated 8 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Apr 24, 2016Updated 9 years ago
- A variable length integer compression library for Golang☆24Apr 7, 2015Updated 10 years ago
- A command-line tool to filter text and highlight the output.☆21Aug 27, 2019Updated 6 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆14May 24, 2022Updated 3 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Mar 22, 2017Updated 8 years ago
- Linux bootkit generator☆22Jan 10, 2015Updated 11 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 9 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Gather information on Wiki contributions from IP ranges☆23Jan 21, 2018Updated 8 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 9 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- Attack Tree modeling sheet for Dia☆20Oct 9, 2018Updated 7 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Multicast Proxy for OpenBSD☆16Mar 29, 2023Updated 2 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Unofficial documentation for the IKEA® TRÅDFRI Shortcut Button (E1812)☆15Feb 7, 2026Updated last month
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Diff tool for comparing export tables in PE images☆24Mar 4, 2020Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Yubikey Authorization Server☆24Feb 22, 2015Updated 11 years ago
- Lightweight, configurable plugin system for Go apps☆11Mar 14, 2016Updated 10 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago