clayball / Dissembling-FerretView external linksLinks
Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.
☆13Apr 19, 2017Updated 8 years ago
Alternatives and similar repositories for Dissembling-Ferret
Users that are interested in Dissembling-Ferret are comparing it to the libraries listed below
Sorting:
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- Linux assembly programs☆17Feb 3, 2026Updated last week
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- Tools and library to manipulate EFI variables.☆10Jan 16, 2026Updated 3 weeks ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- jt65stego project for the purposes of theoretical study and education on the topic of steganography in the JT65 amateur radio protocol☆20Aug 24, 2014Updated 11 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- TRS-80 Star Trek 2014 !!☆17Nov 20, 2025Updated 2 months ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- collateral from http://basicinputoutput.com☆15Feb 15, 2023Updated 2 years ago
- A tool for dumping wtmp files and patching wtmp records☆20Jul 20, 2019Updated 6 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Anatomy of a linux kernel development☆27Mar 30, 2017Updated 8 years ago
- A library to bring the joys of non-systemd users to systemd users☆26Oct 31, 2017Updated 8 years ago
- ☆27Oct 31, 2025Updated 3 months ago
- OverTheWire Wargames write-ups☆24Jun 13, 2017Updated 8 years ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- ☆24Dec 6, 2015Updated 10 years ago
- A command line tool to enumerate TLS cipher-suites supported by a server☆35Apr 25, 2017Updated 8 years ago
- A Glitch art tool☆29Jan 13, 2016Updated 10 years ago
- C++ Keylogger for windows 7. Works with DLL injection on explorer.exe☆26Nov 12, 2014Updated 11 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Analyze Emails☆11Dec 8, 2022Updated 3 years ago
- A simple Makefile for C executables and static libraries☆28Jul 27, 2024Updated last year
- A python tool for sms bombing only Robi and Airtel numbers.☆13Feb 24, 2025Updated 11 months ago
- MCP use case for SecOps automation w/ Splunk,CrowdStrike EDR, MISP☆21Jul 7, 2025Updated 7 months ago
- Participate in the 4th U.S. National Action Plan for Open Government☆13Jun 8, 2018Updated 7 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Jan 11, 2023Updated 3 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Dec 31, 2016Updated 9 years ago
- Playground for the BFQ (Budget Fair Queueing) I/O block scheduler☆24Aug 3, 2017Updated 8 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago