bjornedstrom / toytls
Fun with the TLS handshake
☆31Updated 10 years ago
Alternatives and similar repositories for toytls:
Users that are interested in toytls are comparing it to the libraries listed below
- Alternative hexdump.☆15Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- ☆36Updated 12 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- ☆17Updated 7 years ago
- A simple ssh private key password recovery tool written in Go☆22Updated last year
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- Modifies running processes on Linux☆24Updated 2 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- ☆18Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- strings for a Linux process' address space☆51Updated 11 years ago
- ☆30Updated 9 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Password manager for USB Armory☆37Updated 9 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- Simple multi-stream protocol for use with ZigBee wireless modules. Adds an additional layer of encryption and allows advanced streams suc…☆10Updated 10 years ago
- Mass DNS resolution tool☆36Updated 4 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- ssh key exchange layer for scapy☆13Updated 10 years ago
- ☆17Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- ☆13Updated 7 years ago
- A collection of shellcodes☆67Updated 12 years ago