sha0coder / LAF
This firewall allows only communications made from allowed processes.
☆13Updated 8 years ago
Alternatives and similar repositories for LAF:
Users that are interested in LAF are comparing it to the libraries listed below
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- ☆66Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- ☆17Updated 6 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- A collection of tools mostly written in Python.☆15Updated 9 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆20Updated 8 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19Updated 8 years ago
- zer0m0n driver for cuckoo sandbox☆21Updated 9 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- post-exploitation tools☆15Updated 6 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 9 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- Websocket based egress tester☆20Updated 8 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆11Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- YAPDNS☆39Updated 9 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 5 years ago
- A framework for creating modular bots/backdoors☆21Updated 9 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 6 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Torified Cuckoo malware analyser in a Docker container with VirtualBox☆2Updated 7 years ago
- Simple multi-stream protocol for use with ZigBee wireless modules. Adds an additional layer of encryption and allows advanced streams suc…☆9Updated 9 years ago
- ☆18Updated 8 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆25Updated 5 years ago