Source IP spoofing for anonymization over UDP
☆25Jan 9, 2018Updated 8 years ago
Alternatives and similar repositories for SIPSA
Users that are interested in SIPSA are comparing it to the libraries listed below
Sorting:
- SYN attack with IP spoofing from random IP source address and IP source port☆38Aug 17, 2021Updated 4 years ago
- Go command line app to exploit file upload vulnerability☆12Feb 8, 2017Updated 9 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Oct 5, 2016Updated 9 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆48Nov 24, 2024Updated last year
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- A phishing tool to set a soft-AP on raspberryPi, filter the Http request and DNS query from the client and redirect the connection to a f…☆17Mar 4, 2018Updated 8 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- "Polymorphic" shellcode generator (x86)☆26Oct 28, 2014Updated 11 years ago
- Ruby-Elf is a pure-Ruby library for parse and fetch information about ELF format used by Linux, FreeBSD, Solaris and other Unix-like oper…☆38Jan 31, 2023Updated 3 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- ☆25Jul 8, 2015Updated 10 years ago
- Spam a Telegram conversation of messages☆10Dec 31, 2022Updated 3 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- Various tools related to SSL denial of service☆47Sep 23, 2014Updated 11 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- Scripts to parse and analyze pgp key server data☆33Jul 16, 2020Updated 5 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Nov 21, 2019Updated 6 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Custom Python 2.7 RAT☆10May 25, 2016Updated 9 years ago
- Arduino+Si5351 = Antenna/Network Analyzer☆13Feb 10, 2019Updated 7 years ago
- Configuration and Programs for activating IMU data on Emlid Reach☆11Feb 4, 2018Updated 8 years ago
- Repository of constants used in TLS and X509 parsing☆13May 31, 2022Updated 3 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- Code examples for learn Infrastructure as Code Part01☆10Jun 1, 2021Updated 4 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- A just example of net sniffiring using dll hijaking in Cossacks 3 game☆11Dec 31, 2016Updated 9 years ago
- Configurations for a vertical 72" PiWall system☆13Jan 21, 2017Updated 9 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- A small status bar app, which shows a month calendar when clicking on the status bar icon☆11Aug 24, 2015Updated 10 years ago
- Stuff related to the BMClab public datasets☆10Updated this week
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Eagle schematics☆45Mar 22, 2016Updated 9 years ago
- Checks for Brave Browser Rewards Ad notifications on Windows and closes them☆10Jan 28, 2021Updated 5 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago