Thraetaona / BlitzpingLinks
A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices
☆79Updated 9 months ago
Alternatives and similar repositories for Blitzping
Users that are interested in Blitzping are comparing it to the libraries listed below
Sorting:
- Blessed sanctum, save us || Sanctum is a small, reviewable, capable, pq-secure and fully privilege seperated VPN daemon. || This is a rea…☆80Updated this week
- a file transfer service utilizing quic☆68Updated 10 months ago
- List files in categories (and columns) - from Coherent UNIX☆41Updated 5 years ago
- Block Erasure Format - An extensible, fast, and usable file utility to encode and decode interleaved erasure coded streams of data.☆58Updated last year
- Simple inbound/outbound packet sniffer☆31Updated last year
- The Noisy Sockets CLI☆263Updated last year
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆120Updated 2 weeks ago
- A terminal session recorder and replayer written in C that allows you to capture and replay terminal sessions with precise timing.☆119Updated 3 weeks ago
- create local malicious git repo☆51Updated 7 months ago
- You wouldnt Download an Ad. But you would block one.☆132Updated 4 months ago
- Visualize binary files☆133Updated 2 months ago
- A TCP/UDP load generator that provides fine-grained, flow-level control in Go.☆148Updated 4 months ago
- ☆93Updated last year
- A web fuzzer using the httpipe format☆101Updated last year
- Slapped-together tools to reprogram the BIOS on a bricked HP Envy laptop.☆25Updated 3 years ago
- Fast and standards compliant DNS zone parser☆132Updated last week
- CLI based packet reader in Python.☆108Updated 4 months ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆54Updated 3 weeks ago
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆68Updated last year
- Create Merkle trees from your directories.☆112Updated last year
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- Fast per-request isolation for Linux executables with TinyKVM☆68Updated last week
- Injects code into an ELF file☆52Updated 3 months ago
- Top 500 DNS domains seen on the Quad9 recursive resolver array each day☆157Updated this week
- The fastest 128-bit and 256-bit hash, passes all tests, and under 140 source lines of code. API library and CLI tool in C++ and NodeJS/Wa…☆125Updated 9 months ago
- transfer pipes and files from one computer to another over ssh☆134Updated 9 months ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated last week
- Printf-Style Debugging with Zero-Cost in Production Builds☆165Updated 2 months ago
- Docker WireGuard Driver☆122Updated last year
- AlphaDec, a timezone-agonistic time format for humans, machines, and AI☆77Updated last month