This firewall allows only communications made from allowed processes.
☆13Aug 10, 2016Updated 9 years ago
Alternatives and similar repositories for LAF
Users that are interested in LAF are comparing it to the libraries listed below
Sorting:
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Mar 4, 2016Updated 9 years ago
- Creates fuzzing inputs for command line programs using help options and man pages.☆29Jun 17, 2015Updated 10 years ago
- ☆38Dec 17, 2012Updated 13 years ago
- A distributed corpus distillation tool for windows applications.☆32Feb 13, 2017Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Translate regular Assembly into Extended Instructions☆88Oct 9, 2012Updated 13 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- Pure Java Llama2 inference with optional multi-GPU CUDA implementation☆13Sep 2, 2023Updated 2 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- Additional README's for XSOAR and XSOAR related things☆14Oct 4, 2023Updated 2 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- MipScope is a cross-platform IDE for students learning assembly on the MIPS architecture. The focus is on a convenient debugging environm…☆17May 11, 2024Updated last year
- gitk in your terminal.☆15Mar 6, 2013Updated 12 years ago
- This program will extract the messages from an Outlook Express (5.0 - 6.0) mailbox and convert it either to the standard mbox or the Outl…☆10Dec 8, 2025Updated 2 months ago
- recursos en español para profes con conciencia digital☆11Oct 14, 2018Updated 7 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Workflow for redistribution of Node.JS for actions/runner☆12Feb 15, 2026Updated last week
- Research tools for understanding the insides of HBOOT☆19May 13, 2013Updated 12 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- Generates http servers that respond in predefined manner☆20Apr 7, 2023Updated 2 years ago
- an implementation of Count-Min Sketch, an approximate counting data structure for summarizing data streams, in golang☆13Dec 30, 2019Updated 6 years ago
- Computing with sed: a compiler from python to sed☆11May 24, 2019Updated 6 years ago
- An example repo that demonstrates how to properly test Python code that interface with Elasticsearch.☆12Aug 26, 2020Updated 5 years ago
- A collection of hex utilities in python☆14Mar 1, 2013Updated 12 years ago
- CRC Tool Kit☆18Oct 5, 2012Updated 13 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- A Code highlighting plugin for OllyDbg 2.01.☆16Dec 10, 2014Updated 11 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago