matrix-ac / LAF
Linux Application Firewall
☆57Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for LAF
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 7 years ago
- ☆21Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆10Updated last year
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆38Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆48Updated last year
- ☆12Updated 7 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- Indicator of Compromise Mapping Service☆12Updated 10 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆46Updated 3 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 9 years ago
- ☆15Updated 8 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆36Updated 7 years ago
- A tool for harvesting sysadmin credentials in Linux☆18Updated 4 months ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆56Updated 5 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Artefacts from various retefe campaigns☆10Updated 5 years ago