galkan / linux-system-programming
Unix/Linux System Programming
☆16Updated 10 years ago
Alternatives and similar repositories for linux-system-programming:
Users that are interested in linux-system-programming are comparing it to the libraries listed below
- network pcap fuzzer☆19Updated 10 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Updated 8 years ago
- wifiDOS with scapy☆16Updated 8 years ago
- an ancient irc botnet☆12Updated 9 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆28Updated 8 years ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Updated 7 years ago
- Uses the default firebird database credentials to perform a database dump☆11Updated 10 years ago
- an ancient http botnet☆15Updated 9 years ago
- Metasploit Framework with Viproy installed.☆36Updated 7 years ago
- A collection of shellcodes☆67Updated 12 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 4 years ago
- A Tool for Impersonating CAPTCHA Providers☆17Updated 12 years ago
- CTF Writeups☆18Updated 7 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 5 years ago
- Spy Agency Teasing☆14Updated 10 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago
- Popping boxes with Nmap☆18Updated 12 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆12Updated 9 years ago
- ☆27Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- ☆55Updated 7 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- Scenario-based WiFi Network Threat Simulation☆9Updated 5 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago