andrew-d / rough-auditing-tool-for-securityView external linksLinks
Automatically exported from code.google.com/p/rough-auditing-tool-for-security
☆89May 5, 2021Updated 4 years ago
Alternatives and similar repositories for rough-auditing-tool-for-security
Users that are interested in rough-auditing-tool-for-security are comparing it to the libraries listed below
Sorting:
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Type qualifiers for C☆16Sep 21, 2011Updated 14 years ago
- ☆14Mar 4, 2024Updated last year
- Automated testing of SMTP servers for penetration testing☆14Oct 23, 2025Updated 3 months ago
- A script to bring up PPPoE sessions using Python and scapy☆18Jun 18, 2015Updated 10 years ago
- 冰蝎客户端源码☆14Apr 15, 2020Updated 5 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Vulnerable Source Code Collected from Open Source Repositories for Dataset Generation☆16Dec 3, 2020Updated 5 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- Canari local transforms pcap file analysis☆30Apr 14, 2014Updated 11 years ago
- Parses IE's Automatic Crash Recovery Files☆16Feb 3, 2017Updated 9 years ago
- IPv6 analysis tool: the other side☆36Jan 5, 2014Updated 12 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆16Jul 13, 2015Updated 10 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- ☆43Mar 9, 2016Updated 9 years ago
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 5 months ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Parses MSDN documentation into an XML file☆31Jan 10, 2012Updated 14 years ago
- An automatic API misuse checker for C programs!☆19Apr 3, 2019Updated 6 years ago
- ☆28Feb 11, 2016Updated 10 years ago
- CodeQL library and queries for iterator invalidation☆22May 5, 2021Updated 4 years ago
- Download all of Microsoft's security updates and symbols☆41Mar 31, 2016Updated 9 years ago
- Struts2 Vuls Scanner base perl script☆23Feb 11, 2016Updated 10 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Sep 5, 2021Updated 4 years ago
- 分享在建设安全管理体系、ISO27001、等级保护、安全评审过程中的点点滴滴☆23Aug 27, 2018Updated 7 years ago
- ☆27Jul 21, 2020Updated 5 years ago
- Metasploit Framework☆25Jan 12, 2020Updated 6 years ago
- Heap analysis tooling for dlmalloc☆32Jun 13, 2022Updated 3 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Nov 6, 2013Updated 12 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Бот для приложения "В Клубе" для 2ch☆10Dec 10, 2016Updated 9 years ago
- SSH password logging via PAM☆30Jul 7, 2020Updated 5 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Jul 17, 2013Updated 12 years ago
- Yet Another Source Code Analyzer☆184Jan 27, 2022Updated 4 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Jun 30, 2018Updated 7 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- tool for data recording with a SDR☆26Dec 4, 2020Updated 5 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Oct 10, 2019Updated 6 years ago