sha0coder / LAFLinks
This firewall allows only communications made from allowed processes.
☆13Updated 9 years ago
Alternatives and similar repositories for LAF
Users that are interested in LAF are comparing it to the libraries listed below
Sorting:
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated 2 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 6 years ago
- YAPDNS☆39Updated 10 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Threatbutt Suite☆37Updated 10 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 3 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- Scoreboard for CTF Competitions☆27Updated 9 years ago
- ☆66Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Updated 11 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 9 years ago
- Capture The Flag hacker contest daemon☆34Updated 7 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 11 years ago
- IRMA ansible☆24Updated 8 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- Various Malware-Related Utilities☆10Updated 9 years ago
- LD_PRELOAD library for intercepting the plain text of SSL connections made with openssl☆24Updated 10 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 9 years ago