deanjerkovich / rage_fuzzerView external linksLinks
a dumb protocol-unaware packet fuzzer/replayer
☆24Dec 31, 2017Updated 8 years ago
Alternatives and similar repositories for rage_fuzzer
Users that are interested in rage_fuzzer are comparing it to the libraries listed below
Sorting:
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 4 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Dec 7, 2023Updated 2 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- Industrial Control Systems Protocol Decoders☆22Apr 30, 2014Updated 11 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- KVM Virtualization scripts☆16Oct 11, 2016Updated 9 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 10 years ago
- ☆16Jun 16, 2021Updated 4 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- Locates installed Perl modules.☆22Apr 16, 2023Updated 2 years ago
- Linux shell scripts☆26Sep 25, 2016Updated 9 years ago
- A utility to dump memory of unixy processes☆18Apr 5, 2022Updated 3 years ago
- Python pcap sanitizer☆21Sep 2, 2022Updated 3 years ago
- Universal firewall configuration generator.☆19Jan 24, 2019Updated 7 years ago
- Forensic Analysis Tool for Btrfs File System.☆20Aug 6, 2018Updated 7 years ago
- Create your own Bitwig modulator using the Nitro DSP language☆24May 26, 2017Updated 8 years ago
- Socket programming tutorials in C, python, perl, java, winsock☆29Jun 26, 2013Updated 12 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- A library to bring the joys of non-systemd users to systemd users☆26Oct 31, 2017Updated 8 years ago
- Linux Application Firewall☆58May 23, 2020Updated 5 years ago
- ☆27Oct 31, 2025Updated 3 months ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 8 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Aug 11, 2024Updated last year