vokac / F2B
Fail2ban for Windows
☆41Updated 7 years ago
Alternatives and similar repositories for F2B:
Users that are interested in F2B are comparing it to the libraries listed below
- Low-level MS Windows registry files analysis tools☆20Updated 8 years ago
- EventList - the Baseline Event Analyzer☆11Updated 5 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 9 years ago
- DNS TCP to UDP proxy☆9Updated 9 years ago
- A simple shellcode runner☆20Updated 11 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- Windows DLL Loading Utility☆11Updated 4 years ago
- C++ WinSock2 PCAP with RDI☆13Updated 8 years ago
- Mirror network traffic from one interface to another on Windows☆25Updated 5 years ago
- Based on the research of Windows network architecture and the core packet filtering firewall technology, using NDIS intermediate driver, …☆31Updated 9 years ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 6 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆18Updated 5 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 9 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- Windows Syslog Command Line Client☆15Updated 12 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- Volatility memory forensics plugin for extracting Windows DNS Cache☆29Updated 8 years ago
- Custom Credential Provider to Log credentials on Windows 7 and higher☆16Updated 7 years ago
- DLL Injection commandline utility☆26Updated 12 years ago
- Carve Windows Prefetch files from arbitrary binary data☆14Updated 7 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆12Updated 9 years ago
- it's a simple LKM rootkit.☆12Updated 8 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆14Updated 7 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆27Updated 8 years ago
- RC4 Encryption with CryptoAPI and C☆15Updated 9 years ago
- Command line utility that executes a command (plaintext or encryted) as another user account or under specified user session☆17Updated 5 years ago