matrix-ac / LAFLinks
Linux Application Firewall
☆58Updated 5 years ago
Alternatives and similar repositories for LAF
Users that are interested in LAF are comparing it to the libraries listed below
Sorting:
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- ☆15Updated 8 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆26Updated 9 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated last year
- A Network Inspection Tool☆81Updated 7 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Updated 8 years ago
- post-exploitation tools☆15Updated 7 years ago
- intel amt honeypot☆18Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Educational Python penetration testing framework☆9Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- A simple command-line script to interact with the virustotal-api☆61Updated 7 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- See here:☆42Updated 12 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- POC for IAT Parsing Payloads☆48Updated 8 years ago