It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.
☆19Nov 24, 2013Updated 12 years ago
Alternatives and similar repositories for DNS-Sniffer
Users that are interested in DNS-Sniffer are comparing it to the libraries listed below
Sorting:
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Comodo☆15Oct 14, 2024Updated last year
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Android app for trying Intents, Content Providers and Binder interfaces☆18Oct 29, 2017Updated 8 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 10 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- Script that dumps running process memory from Linux systems using /proc.☆80Aug 6, 2013Updated 12 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- Build a secure android app☆28Jan 7, 2015Updated 11 years ago
- Linux shell scripts☆26Sep 25, 2016Updated 9 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- A utility to dump memory of unixy processes☆18Apr 5, 2022Updated 3 years ago
- A Simple Http to Raw Socket Adapter for Android☆12Aug 30, 2015Updated 10 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Add audio to Web images☆50Sep 9, 2013Updated 12 years ago
- Eclipse plugin to remote adb to an android device.☆24May 10, 2013Updated 12 years ago
- Imported from https://gitorious.org/beagleboard-usbsniffer/☆15Oct 19, 2015Updated 10 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Mimicking grids in Android lists☆148Apr 15, 2015Updated 10 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Sample code for ICS security blog posts☆19Dec 2, 2012Updated 13 years ago
- Have fun!☆31Nov 5, 2017Updated 8 years ago
- Create your own Bitwig modulator using the Nitro DSP language☆24May 26, 2017Updated 8 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- TLS pinning for Java☆40Nov 18, 2024Updated last year