baruch / gpart
Collating patches for gpart from all distributions
☆29Updated last year
Alternatives and similar repositories for gpart:
Users that are interested in gpart are comparing it to the libraries listed below
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 8 years ago
- Fast SSH server and open proxy scanner☆35Updated 7 months ago
- Library and tools to access the Extended File System☆17Updated 4 months ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- Several example uses of TPM2/TSS APIs.☆10Updated 9 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- Tor Browser Downloader - Automates download and verification of Tor Browser from The Tor Project's website. This package is produced inde…☆16Updated last week
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 9 years ago
- Qubes OS architecture diagrams for use in articles, posts and docs☆16Updated 7 years ago
- An IP-Transparent Tor Hidden Service and I2P Connector☆16Updated 11 years ago
- Wireshark regression tests☆11Updated 4 years ago
- Some scripts to create a reproducible build for grsecurity☆30Updated 7 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Base OpenXT build scripts☆49Updated 3 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Anti Hacking Team TrustedBSD module☆26Updated 10 years ago
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- ☆36Updated 12 years ago
- The Rex Socket Abstraction Library☆12Updated 3 weeks ago
- Tools and library to manipulate EFI variables.☆10Updated 9 months ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Updated 13 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 9 months ago
- Extract LZMA sections from cable modem firmware images☆20Updated 11 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Block pages hosted on censorship sites all around the world.☆14Updated 2 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Updated 9 years ago
- ☆34Updated 6 years ago