ANSSI-FR / lidi
Transfer a raw TCP or Unix stream or files through a unidirectional link with forward error correction
☆48Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for lidi
- A set of tools to transfer data over a unidirectional network link (typically a network diode).☆53Updated 7 years ago
- DEbian Cve REproducer Tool☆22Updated last year
- ☆17Updated 7 months ago
- ☆21Updated 6 months ago
- Service Locator Protocol Research Tool☆9Updated last year
- Detect and remove the presence of canary tokens☆17Updated 11 months ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- ☆55Updated 3 weeks ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆47Updated last year
- Cerberus is another simple stressing tool simulating DDoS attacks.☆22Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆38Updated last year
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 4 years ago
- Clone network interface from one host as a tap interface on another host☆54Updated 3 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆108Updated 3 weeks ago
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆18Updated last year
- singe's grep - a fast grep using single-file parallelism☆48Updated 2 years ago
- ☆20Updated last month
- Tools to generate a Debian Linux distribution with chipsec to test hardware requirements☆46Updated 3 years ago
- Python3 scripts that executes an elf (Linux executable format) completely in memory.☆23Updated last year
- iTLB multihit PoC☆40Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆17Updated 3 years ago
- F-Secure Armory Drive - USB encrypted drive with mobile unlock over BLE☆54Updated last month
- A co-simulation framework for reasearching cybersecurity in power grids.☆19Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 2 years ago
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆21Updated this week
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Updated 2 years ago
- ☆83Updated 4 months ago
- SecurityBsides Roma Conference Repo☆10Updated last year