HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.
☆25Jul 26, 2017Updated 8 years ago
Alternatives and similar repositories for hexinject
Users that are interested in hexinject are comparing it to the libraries listed below
Sorting:
- ☆39Jul 26, 2017Updated 8 years ago
- ☆10Dec 13, 2016Updated 9 years ago
- ☆12Jan 28, 2026Updated last month
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- Syn flood implementation with raw sockets.☆13Nov 24, 2014Updated 11 years ago
- ☆28Mar 29, 2019Updated 6 years ago
- ☆10Jul 26, 2017Updated 8 years ago
- Parrot Software Center mirror repo. Main development is done at https://nest.parrotsec.org/parrot-packages/parrot-software-center☆10Feb 17, 2019Updated 7 years ago
- backup repository https://dev.parrotsec.org/parrot/parrot-menu/☆17Dec 2, 2025Updated 3 months ago
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆18Oct 30, 2014Updated 11 years ago
- Send encrypted messages to GitHubers via their SSH public key☆15Feb 22, 2018Updated 8 years ago
- Curses music visualizer for MPD - forked from git.2f30.org☆10Feb 20, 2015Updated 11 years ago
- ☆48Feb 4, 2026Updated last month
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Sep 18, 2016Updated 9 years ago
- ☆52Sep 15, 2016Updated 9 years ago
- ☆58Jul 26, 2017Updated 8 years ago
- Shell Tool for BIOS Developer☆12Jan 20, 2017Updated 9 years ago
- ☆25Jul 26, 2017Updated 8 years ago
- Dll Convert to Shellcode.☆41Jul 4, 2022Updated 3 years ago
- debian installer for parrot security☆30Aug 1, 2024Updated last year
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- How to create an OS from scratch☆12Jan 22, 2020Updated 6 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16May 27, 2019Updated 6 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Apr 6, 2020Updated 5 years ago
- GitLab as a Sandstorm app☆20Jun 10, 2017Updated 8 years ago
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- Sorgenti del "Vademecum per il Software Libero"☆13Jun 3, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- All the info you need.☆21Aug 14, 2023Updated 2 years ago
- Termux-penv: A tool to install and manage 32-bit and 64-bit Termux chroot environments for cross-compilation and multi-arch testing on An…☆14Dec 28, 2025Updated 2 months ago
- Creating executables from ELF-coredumps☆10Dec 7, 2015Updated 10 years ago
- This is the android client/trojan, it's undetectable, can turn the target phone to a HTTP proxy and runs in the background permanently wi…☆13Jan 10, 2021Updated 5 years ago
- ohrwurm is an RTP fuzzer. features some SIP parsing and RTCP suppressing.☆17Sep 30, 2010Updated 15 years ago
- Some Of MY TOOLS☆11Jul 4, 2024Updated last year
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- Lightweight justice for your single-board computer!☆18Apr 20, 2023Updated 2 years ago
- Simple code generation library developed in C intended for code generation in Kernel mode☆17Dec 9, 2022Updated 3 years ago
- Crack the verification hash of the encrypted payload of the Gauss Virus☆20Dec 25, 2021Updated 4 years ago
- Frontend HTML accelarator for websites (implemented in Java as a reverse proxy)☆21Feb 6, 2016Updated 10 years ago