eteran / libp0fLinks
modernized and C99 compliant port of p0f (Passive OS fingerprinting)
☆20Updated 7 years ago
Alternatives and similar repositories for libp0f
Users that are interested in libp0f are comparing it to the libraries listed below
Sorting:
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Updated 10 years ago
- Proof of Concept code for CVE-2016-5696☆102Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆75Updated 9 years ago
- proxy poc implementation of STARTTLS stripping attacks☆169Updated 4 years ago
- Wolves Among the Sheep☆147Updated 2 years ago
- Mass scanning and fuzzing library☆48Updated 2 weeks ago
- A Libemu Cython wrapper☆128Updated 2 years ago
- ☆48Updated 3 years ago
- ☆137Updated 7 years ago
- The NoSQL Honeypot Framework☆103Updated 2 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆177Updated 3 years ago
- POLAR☆74Updated 6 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆153Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆100Updated 10 years ago
- ActionScript3 dynamic instrumentation tool☆36Updated 8 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated 2 years ago
- PyAna - Analyzing the Windows shellcode☆247Updated 9 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago
- Small tool for disassembling shellcode (using objdump)☆149Updated 3 years ago
- ☆74Updated 3 years ago
- Scoreboard for CTF Competitions☆27Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Updated 9 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆96Updated 4 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Updated 10 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Updated 10 years ago
- Scalable Binary Data Extraction in Hadoop☆144Updated 11 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- ☆111Updated 8 years ago