beave / iwar2Links
iWar2 - The war dialer
☆12Updated 7 years ago
Alternatives and similar repositories for iwar2
Users that are interested in iwar2 are comparing it to the libraries listed below
Sorting:
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 4 years ago
- A Voip Wardialer for the phreaking of 2020☆55Updated last year
- iWar - The intelligent war dialer.☆28Updated 5 years ago
- Dump GNU IFUNC implementation offsets from libc☆11Updated 2 years ago
- ☆57Updated 11 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 11 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- A simple program that calculates a checksum over its own executable program memory☆11Updated 8 years ago
- Files compiled from the Logica breach investigation materials☆44Updated 6 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- USB Attack Development Platform☆31Updated 7 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Transforms any file into a protected ELF executable☆28Updated 10 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- Dump sections or program entries from a ELF file☆24Updated 9 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 7 years ago
- Parses DNS responses in a secure, rigorous manner☆21Updated 4 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated last year
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Docker environment for 4.3BSD on VAX.☆19Updated 2 years ago
- Crypt Breaker's Workbench☆18Updated 10 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 7 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆13Updated last year
- ☆32Updated 5 years ago
- IDAPython-1.0.0 patches and .def file needed to build for IDA 5.0 free☆10Updated 10 years ago
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆18Updated last week