Linux Application Firewall
☆59May 23, 2020Updated 5 years ago
Alternatives and similar repositories for LAF
Users that are interested in LAF are comparing it to the libraries listed below
Sorting:
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 2 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Oct 3, 2012Updated 13 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Feb 25, 2021Updated 5 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- This firewall allows only communications made from allowed processes.☆13Aug 10, 2016Updated 9 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- A multi-threaded Python tool to generate screenshot of websites☆31Dec 3, 2015Updated 10 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- strings for a Linux process' address space☆51Jun 15, 2013Updated 12 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago