50m30n3 / dsptunnelLinks
IP over audio tunnel
☆27Updated 13 years ago
Alternatives and similar repositories for dsptunnel
Users that are interested in dsptunnel are comparing it to the libraries listed below
Sorting:
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- BitErrant☆58Updated 8 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 2 months ago
- See my shmoocon talk repo for updated code:☆25Updated 11 years ago
- ☆36Updated 12 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- ☆15Updated 8 years ago
- Hacking Games in a Hacked Game☆29Updated 10 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- ☆12Updated 8 years ago
- Papers on reverse engineering and assembly language programming☆38Updated 4 years ago
- Check for HTTP Security Headers☆13Updated 9 years ago
- Proof-of-Concept code for exploits☆82Updated 9 years ago
- Some kernel exploit i wrote☆76Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 10 years ago
- DRDoS UDP amplification tool☆17Updated 10 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- ☆24Updated 10 years ago
- TCP tunnel with Vernam Encryption☆26Updated 10 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- Shellcodes for different usecases☆9Updated 9 years ago