kaie / sphere-detection
Various modules to implement the DetecTor design from http://detector.kuix.de
☆52Updated 8 years ago
Alternatives and similar repositories for sphere-detection:
Users that are interested in sphere-detection are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- ☆12Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- ☆24Updated 9 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- IRMA frontend☆25Updated 8 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆12Updated 10 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆17Updated 7 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 6 months ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 10 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 8 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- ☆36Updated 12 years ago