kpcyrd / tr1pdLinks
tamper resistant audit log
☆18Updated 7 years ago
Alternatives and similar repositories for tr1pd
Users that are interested in tr1pd are comparing it to the libraries listed below
Sorting:
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- ☆35Updated 13 years ago
- ☆25Updated 10 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- ROP gadget finder and analysis in pure Javascript☆27Updated 3 years ago
- A high scalable low to medium interactive SSH/TCP honeypot using Linux Namespaces, capabilities, seccomp, cgroups designed for OpenWrt an…☆31Updated 5 years ago
- Pong revolution.☆16Updated last month
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Updated 8 years ago
- ☆16Updated 5 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Geolocate your files!☆16Updated 3 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago
- Full-bin indexation of binary files☆95Updated 7 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆117Updated 2 years ago
- Underconstrained symbolic execution for cryptography verification☆19Updated 4 years ago
- Toolset to analyse TLS datasets☆12Updated 6 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- bunch of random stuff☆21Updated 5 years ago
- Fast defcon 26 quals pow solver☆26Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 6 years ago
- Differential fuzzing for elliptic curves☆24Updated 2 years ago