TETYYS / LiveProxies
Asynchronous proxy checker
☆18Updated 8 years ago
Alternatives and similar repositories for LiveProxies:
Users that are interested in LiveProxies are comparing it to the libraries listed below
- Detect HTTP packet and inject redirect packet☆14Updated 7 years ago
- DRDoS UDP amplification tool☆17Updated 9 years ago
- DLL Injection commandline utility☆26Updated 12 years ago
- ☆15Updated 10 years ago
- another socks5 server , support linux, BSD , use epoll and kqueue technology☆12Updated 7 years ago
- network speed limiter for Windows☆16Updated 8 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 9 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- ☆10Updated 9 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Updated 13 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Block process execute kernel driver for Windows x64☆19Updated 9 years ago
- A fork from http://create.stephan-brumme.com/hash-library/.☆15Updated last year
- Library for binary signature scanning.☆28Updated 7 months ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Minimal DLL-injection tool.☆36Updated 9 years ago
- An idea in hooking APIs by replacing calls that lead to them☆1Updated 2 years ago
- ☆21Updated 10 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- A library which makes modification of browsers' behavior easy.☆10Updated 4 years ago
- ☆9Updated 8 years ago
- SSH bruteforce utility☆21Updated 6 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Updated 8 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- Create shellcode from executable or assembly code☆12Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 11 years ago