FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 and IPv6 routing.
☆14Nov 18, 2019Updated 6 years ago
Alternatives and similar repositories for faucet
Users that are interested in faucet are comparing it to the libraries listed below
Sorting:
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆47Mar 25, 2019Updated 6 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- A Valheim mod that attempts to fix lag due to terraforming☆10Mar 25, 2021Updated 4 years ago
- Sometimes it can be complicated to read certain sensors to see what is going on. This tutorial makes that simple, with only open-source t…☆11Apr 1, 2021Updated 4 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- [DEPRECATED] utility functions for several generative algorithms.☆10Sep 5, 2016Updated 9 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Open source HTML5 charts using the canvas tag.☆33Dec 4, 2015Updated 10 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆13Feb 6, 2023Updated 3 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- an iSCSI demo driver for Windows☆12Sep 21, 2015Updated 10 years ago
- Example code for controlling GPIO features of a Raspberry Pi.☆14Dec 21, 2016Updated 9 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- Learn to build technical communities on your campus,☆12Aug 4, 2022Updated 3 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- WizardsToolkit is a secure C library offering cross-platform cryptography, hashing, authentication, and data integrity tools. It supports…☆16Feb 16, 2026Updated last month
- ☆12Jul 30, 2025Updated 7 months ago
- This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg☆52Dec 26, 2013Updated 12 years ago
- NextReports Engine☆23Jul 27, 2018Updated 7 years ago
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- A tool to showcase the Therac-25 bugs☆12Jun 11, 2019Updated 6 years ago
- SQL SERVER Exploitation.☆27Mar 18, 2017Updated 9 years ago
- ☆13Feb 16, 2016Updated 10 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆20Jul 11, 2021Updated 4 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 8 months ago
- kali linux tutorials and commands for ethical hackers and penetration testing☆10Jul 6, 2025Updated 8 months ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Oct 8, 2024Updated last year
- Files that dictate the tauOS OSTree☆11Jun 28, 2023Updated 2 years ago
- finite statemachine editor for vvvv☆22Dec 8, 2022Updated 3 years ago
- NSA Hacking Tool Recreation UnitedRake☆13Jul 11, 2019Updated 6 years ago
- x86 Disassembly in pure java☆11Apr 12, 2022Updated 3 years ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 8 months ago