dom96 / deautherLinks
An interactive command-line deauther for macOS.
☆72Updated 6 years ago
Alternatives and similar repositories for deauther
Users that are interested in deauther are comparing it to the libraries listed below
Sorting:
- Probably the first ELF binary infector ever created in Nim.☆28Updated 5 years ago
 - DrMITM is a program designed to globally log all traffic of a website.☆29Updated 6 years ago
 - Intro to Assembly Optimization stream repo☆26Updated 3 years ago
 - relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
 - Raw system calls for Nim☆43Updated last year
 - 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆53Updated 5 years ago
 - subhook wrapper for Nim https://github.com/Zeex/subhook☆18Updated 10 months ago
 - Palantir is a Lua scriptable, portable, tiny reverse shell, using a human readable protocol written in C and Lua.☆19Updated 7 years ago
 - A filtering SOCKS proxy server and client library written in nim.☆64Updated 2 years ago
 - Nim Socks5 library☆29Updated 3 years ago
 - A virus checker for nim binaries☆22Updated 2 months ago
 - backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
 - ld_preload userland rootkit☆35Updated 4 years ago
 - ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 5 years ago
 - Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
 - Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
 - suspect is a simple bash triage tool☆18Updated 7 years ago
 - ☆35Updated 13 years ago
 - The first Linux hooking framework to allow merging two binary files into one!☆96Updated 5 months ago
 - Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
 - Library for reading KeePass files and decrypt the passwords within it☆14Updated last year
 - A cross-platform Nim implant for Prelude Operator☆32Updated 3 years ago
 - ☆21Updated 4 years ago
 - CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
 - the puppy proxy☆22Updated 5 years ago
 - strings for a Linux process' address space☆51Updated 12 years ago
 - Linux Runtime Process Injection Tool☆61Updated 12 years ago
 - ☆13Updated 11 years ago
 - Ghidra plugin to communicate with radare2☆62Updated last week
 - ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago