sha0coder / LAFLinks
This firewall allows only communications made from allowed processes.
☆13Updated 9 years ago
Alternatives and similar repositories for LAF
Users that are interested in LAF are comparing it to the libraries listed below
Sorting:
- yara rules for crypto detection☆31Updated 11 years ago
- YAPDNS☆39Updated 10 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Updated 10 years ago
- Scoreboard for CTF Competitions☆27Updated 9 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 6 years ago
- Converts the Clamav Virus Database definitions to YARA rules [GOLANG]☆52Updated 4 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Kippo configured to be a backdoored netscreen☆11Updated 10 years ago
- Threatbutt Suite☆37Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆38Updated 2 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 10 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 5 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- Capture The Flag hacker contest daemon☆33Updated 8 years ago
- Proof of Concept code for CVE-2016-5696☆102Updated 9 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Updated 8 years ago
- The NoSQL Honeypot Framework☆103Updated 2 years ago
- Test suite for bypassing Malware sandboxes.☆38Updated 11 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- ☆17Updated 7 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago