50m30n3 / dsptunnel
IP over audio tunnel
☆27Updated 13 years ago
Alternatives and similar repositories for dsptunnel:
Users that are interested in dsptunnel are comparing it to the libraries listed below
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆36Updated 12 years ago
- ☆15Updated 8 years ago
- Public resources NB shares☆18Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- LD_PRELOAD library for intercepting the plain text of SSL connections made with openssl☆24Updated 10 years ago
- ☆12Updated 8 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago
- DRDoS UDP amplification tool☆17Updated 9 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- ☆24Updated 9 years ago
- Quantum Insert/FoxAcid case study☆15Updated 7 years ago
- Linux kernel modules developed by me for learning purposes☆20Updated 12 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 9 years ago
- Creating a reverse shell that works on multiple POSIX platforms☆8Updated 9 years ago
- Proof-of-Concept code for exploits☆82Updated 9 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Side channel-based network measurement tools.☆16Updated 9 years ago
- Check for HTTP Security Headers☆13Updated 9 years ago
- ☆24Updated 9 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- OS X rootkit loader version #1☆18Updated 10 years ago