LeStarch / hyper-socket
A socket to rule all other sockets.
☆9Updated 9 years ago
Alternatives and similar repositories for hyper-socket:
Users that are interested in hyper-socket are comparing it to the libraries listed below
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- A tool to extract code from individual functions in a library.☆16Updated 4 months ago
- tamper resistant audit log☆18Updated 6 years ago
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- Tools for testing C compilers for the correct handling of volatile objects.☆26Updated 10 years ago
- Clash Royale protocol dissector for Wireshark☆15Updated 8 years ago
- An open radio protocol for transmitting UAV flight data in real time.☆11Updated 7 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Tracks runtime instruction execution in Linux programs☆34Updated 11 years ago
- ☆13Updated 7 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- Data graphing library for command line.☆15Updated 3 years ago
- A docker image to host one's DNS-over-HTTPS proxy☆28Updated 5 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 9 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- ☆16Updated 7 years ago
- Turns virtual usbredir connections into physical ones☆13Updated 4 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 8 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated this week
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 9 years ago
- Source code for the article "A bug story: data alignment on x86"☆16Updated 8 years ago
- HMAC-SHA-256 C++11 library designed for embedded systems☆12Updated last year
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Heap analysis tooling for mempool☆13Updated 2 years ago