sha0coder / LAFLinks
This firewall allows only communications made from allowed processes.
☆13Updated 8 years ago
Alternatives and similar repositories for LAF
Users that are interested in LAF are comparing it to the libraries listed below
Sorting:
- yara rules for crypto detection☆31Updated 11 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆26Updated 6 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 5 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- vstruct based dissectors for various file/protocol formats☆15Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Yara Plugin for Binary Ninja☆13Updated 7 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- Summit Route End Point Protection - Server code☆12Updated 9 years ago
- ☆16Updated 10 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆11Updated 9 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- YAPDNS☆39Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 9 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 10 years ago
- ☆18Updated 8 years ago