50m30n3 / dsptunnel
IP over audio tunnel
☆27Updated 13 years ago
Alternatives and similar repositories for dsptunnel:
Users that are interested in dsptunnel are comparing it to the libraries listed below
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆15Updated 8 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- ☆36Updated 12 years ago
- DRDoS UDP amplification tool☆17Updated 9 years ago
- See my shmoocon talk repo for updated code:☆25Updated 11 years ago
- ☆24Updated 9 years ago
- Automatic detection of hashing algorithms☆21Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- ☆12Updated 8 years ago
- lte security☆41Updated 9 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Updated 9 years ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 10 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- OS X rootkit loader version #1☆18Updated 10 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Some kernel exploit i wrote☆77Updated 10 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26Updated 13 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Public resources NB shares☆18Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 9 years ago
- ☆24Updated 9 years ago
- A tool for securing communications between a client and a DNS resolver☆21Updated 9 years ago