sha0coder / LAF
This firewall allows only communications made from allowed processes.
☆13Updated 8 years ago
Alternatives and similar repositories for LAF:
Users that are interested in LAF are comparing it to the libraries listed below
- yara rules for crypto detection☆30Updated 10 years ago
- ☆16Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- Yara Plugin for Binary Ninja☆13Updated 7 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- YAPDNS☆39Updated 9 years ago
- zer0m0n driver for cuckoo sandbox☆21Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 10 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19Updated 8 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆25Updated 6 years ago
- vstruct based dissectors for various file/protocol formats☆15Updated 7 years ago
- Host files with DNS☆32Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Updated 11 years ago
- ☆18Updated 8 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 5 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Capture The Flag hacker contest daemon☆32Updated 7 years ago