kpcyrd / tr1pdLinks
tamper resistant audit log
☆17Updated 7 years ago
Alternatives and similar repositories for tr1pd
Users that are interested in tr1pd are comparing it to the libraries listed below
Sorting:
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- ☆35Updated 13 years ago
- Toolset to analyse TLS datasets☆12Updated 6 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- A DNS library for Rust.☆23Updated 9 months ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- Pong revolution.☆16Updated 2 months ago
- Full-bin indexation of binary files☆95Updated 7 years ago
- ☆17Updated 11 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Web based code browser using clang to provide basic code analysis.☆46Updated 8 years ago
- A list of backdoor samples I find online.☆13Updated 6 years ago
- Geolocate your files!☆16Updated 4 years ago
- Minimal Indicator Storage System☆11Updated 4 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- ☆25Updated 10 years ago
- Detect Phishing fetching Certificate Transparency Logs☆21Updated 5 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 6 years ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 5 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Library and tools to access the GUID Partition Table (GPT) volume system format☆11Updated 3 weeks ago
- Tor relay nearest neighbour ranking☆10Updated 4 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago