galkan / linux-system-programmingLinks
Unix/Linux System Programming
☆16Updated 10 years ago
Alternatives and similar repositories for linux-system-programming
Users that are interested in linux-system-programming are comparing it to the libraries listed below
Sorting:
- network pcap fuzzer☆19Updated 10 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Updated 8 years ago
- wifiDOS with scapy☆16Updated 9 years ago
- an ancient http botnet☆15Updated 10 years ago
- A toolkit for CTFs☆15Updated 7 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- ☆28Updated 8 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆28Updated 8 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Updated 7 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- ☆24Updated 6 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- an ancient irc botnet☆12Updated 10 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A Single Library Parser to extract meta information,static analysis and detect macros within the files.☆1Updated 6 years ago
- ☆15Updated 8 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 6 years ago
- A symbolic execution engine for the VEX IR☆9Updated 9 years ago
- A Tool for Impersonating CAPTCHA Providers☆17Updated 12 years ago
- ☆16Updated 5 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago