TCP tunnel with Vernam Encryption
☆27Mar 7, 2015Updated 10 years ago
Alternatives and similar repositories for VernamTunnel
Users that are interested in VernamTunnel are comparing it to the libraries listed below
Sorting:
- A lightweight tunnel proxy, just a toy☆10Apr 6, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- A gevent based socks5 tunnel server.☆17Jul 10, 2012Updated 13 years ago
- A remote access trojan over DNS☆97Dec 23, 2015Updated 10 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- NN on FPGA☆22Jun 10, 2017Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- network pcap fuzzer☆21Jan 19, 2015Updated 11 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- An extremely fast, clean and easy-to-use SOCKS5 proxy server written in Go.☆21Dec 20, 2015Updated 10 years ago
- A guided tour of docker basics☆24Nov 2, 2017Updated 8 years ago
- JNI method enumeration in ELF files☆50Jan 8, 2016Updated 10 years ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago
- Android malware static & dynamic analysis and automated action (deprecated)☆21May 18, 2021Updated 4 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- Test case minimizer for afl-fuzz☆27Jul 19, 2017Updated 8 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆39Jan 6, 2015Updated 11 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Aug 26, 2015Updated 10 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- libfuzzerfication - fuzzing for the rest of us!☆61Jan 9, 2017Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆38Aug 17, 2022Updated 3 years ago
- Statically linked Library detector☆70Jan 26, 2015Updated 11 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Simple but effective word list transmutation command-line app. Feed it words, and mangle them into new variations quickly and easily!☆33May 5, 2016Updated 9 years ago