alexis-ld / pycketView external linksLinks
A simple python packet sniffer and manipulation tool for linux
☆18Nov 26, 2015Updated 10 years ago
Alternatives and similar repositories for pycket
Users that are interested in pycket are comparing it to the libraries listed below
Sorting:
- python packet sniffer☆11Jan 25, 2018Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- LG Root Exploit☆36Jun 26, 2013Updated 12 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Python script that can scan for xss vulnerabilities in websites, this script has many features like scanning for xss in headers using pro…☆14Oct 27, 2016Updated 9 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 10 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 9 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 9 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- ☆17Jun 3, 2025Updated 8 months ago
- Solutions to crackmes☆19May 22, 2015Updated 10 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 9 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Mar 13, 2013Updated 12 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Extract LZMA sections from cable modem firmware images☆20Nov 18, 2013Updated 12 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 10 months ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Jun 25, 2016Updated 9 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- ☆21Mar 24, 2015Updated 10 years ago
- A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.☆16Apr 5, 2024Updated last year
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Dec 1, 2016Updated 9 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- ☆48Oct 19, 2015Updated 10 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago