I publish here my patch sets for Linux
☆31Apr 21, 2019Updated 6 years ago
Alternatives and similar repositories for linux
Users that are interested in linux are comparing it to the libraries listed below
Sorting:
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- A collection of small hacks I wrote over the years☆36Feb 1, 2023Updated 3 years ago
- user space tool for inspection and simple manipulation of eBPF programs and maps☆25Feb 1, 2018Updated 8 years ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- gr-osmosdr fork with hackrf_tcp source support☆36Sep 5, 2014Updated 11 years ago
- ☆33Oct 9, 2017Updated 8 years ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Sep 9, 2015Updated 10 years ago
- 🕰 Easily insert current stamp, time, date and datetime in Sublime Text☆12Jun 28, 2018Updated 7 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- sample code for educate myself-_-☆44Apr 3, 2016Updated 9 years ago
- SHA-3 finalist (reference code)☆41May 2, 2014Updated 11 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- This repo would serve as an interface between the different clients and the platform. For API information please refer to the fabric8-ana…☆12Apr 13, 2023Updated 2 years ago
- This is an implementation of SafeBricks, based on NetBricks maintained by Comcast and refined by Yang: https://github.com/YangZhou1997/Ne…☆10Feb 3, 2020Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- DNS resolution via glibc for rust☆11Nov 27, 2025Updated 3 months ago
- Many companies are utilizing the cloud for their day to day activities. Many big cloud service providers like AWS, Microsoft Azure have b…☆11Nov 13, 2022Updated 3 years ago
- List of PHP behaviours you don't expect☆11Jul 11, 2019Updated 6 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Docker Pets is a simple application that's useful for testing out features of Docker Enterprise Edition.☆12Jul 10, 2017Updated 8 years ago
- Perintah : $pkg update && pkg upgrade $pkg install python2 $pkg install git $git clone https://github.com/spider-fb/spider-fb $pip2 …☆10Jul 10, 2020Updated 5 years ago
- bot and proxy for Minecraft☆24May 7, 2013Updated 12 years ago
- ☆10May 30, 2017Updated 8 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- My multi-system flake configuration☆12Updated this week
- Examples of programs written in several languages☆11Apr 18, 2023Updated 2 years ago
- Regular expression for form validations synthesizer☆15Apr 17, 2025Updated 10 months ago
- Content presented for the Insider Dev Tour 2018.☆15Jun 27, 2023Updated 2 years ago
- Demonstrates how to use private ActiveRecord models in a Rails application.☆10Jan 19, 2023Updated 3 years ago
- A thread-safe, generic in-memory key-value store for Go, suitable for single-machine applications.☆10Oct 25, 2024Updated last year
- ☆11Nov 21, 2017Updated 8 years ago
- A Chat Server/Client with built-in RSA encryption written in Python☆10Feb 5, 2013Updated 13 years ago
- Turn your Raspberry Pi into router☆26Mar 29, 2014Updated 11 years ago