kpcyrd / tr1pdLinks
tamper resistant audit log
☆18Updated 7 years ago
Alternatives and similar repositories for tr1pd
Users that are interested in tr1pd are comparing it to the libraries listed below
Sorting:
- Test Suite for John the Ripper☆25Updated 3 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 5 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- Docker image: DNS over HTTPS proxy☆11Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- A simple tool to fetch and filter domain blacklists for use with tools like https://github.com/DNSCrypt/dnscrypt-proxy☆22Updated 2 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 5 years ago
- ☆17Updated 11 years ago
- Cryptographic Dataset Generation & Modelling Framework☆39Updated 5 years ago
- Minimalistic DNS logging tool☆44Updated 3 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- Pong revolution.☆13Updated 5 years ago
- Geolocate your files!☆16Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- suspect is a simple bash triage tool☆18Updated 7 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Man-in-the-middle against Tor bridges☆27Updated 5 years ago
- create an onion site from a directory, file, zip or an HTTP(S) site☆32Updated 6 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- ld_preload userland rootkit☆35Updated 4 years ago