kpcyrd / tr1pdLinks
tamper resistant audit log
☆18Updated 7 years ago
Alternatives and similar repositories for tr1pd
Users that are interested in tr1pd are comparing it to the libraries listed below
Sorting:
- Cryptographic Dataset Generation & Modelling Framework☆39Updated 5 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆49Updated 4 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Updated 8 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 5 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- ☆35Updated 13 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- ☆25Updated 10 years ago
- Geolocate your files!☆16Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- ☆12Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago
- lojax_uefi_rootkit_checker☆18Updated 6 years ago
- Frontend for MalShare.com☆17Updated 2 months ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- quotes i like.☆16Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 6 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆34Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago