kpcyrd / tr1pdLinks
tamper resistant audit log
☆17Updated 7 years ago
Alternatives and similar repositories for tr1pd
Users that are interested in tr1pd are comparing it to the libraries listed below
Sorting:
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Toolset to analyse TLS datasets☆12Updated 6 years ago
- ☆35Updated 13 years ago
- Fast defcon 26 quals pow solver☆24Updated 7 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆90Updated 6 years ago
- Pong revolution.☆16Updated 3 months ago
- ld_preload userland rootkit☆35Updated 5 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Full-bin indexation of binary files☆95Updated 7 years ago
- ☆25Updated 10 years ago
- Test Suite for John the Ripper☆25Updated last month
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Tor relay nearest neighbour ranking☆10Updated 4 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Historical Tracking of MAC Address Assignments☆40Updated this week
- A simple tool to fetch and filter domain blacklists for use with tools like https://github.com/DNSCrypt/dnscrypt-proxy☆23Updated 2 years ago
- A list of backdoor samples I find online.☆13Updated 6 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- A framework to track the evolution of Operating Systems over time☆66Updated 2 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Library and tools to access the GUID Partition Table (GPT) volume system format☆11Updated last month
- Code to fuzz bignum libraries☆46Updated 7 years ago