galkan / linux-system-programming
Unix/Linux System Programming
☆16Updated 10 years ago
Alternatives and similar repositories for linux-system-programming:
Users that are interested in linux-system-programming are comparing it to the libraries listed below
- wifiDOS with scapy☆16Updated 8 years ago
- an ancient http botnet☆15Updated 10 years ago
- network pcap fuzzer☆19Updated 10 years ago
- Uses the default firebird database credentials to perform a database dump☆11Updated 10 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 5 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆28Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- CTF Writeups☆18Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- A toolkit for CTFs☆15Updated 6 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 4 years ago
- A collection of shellcodes☆67Updated 12 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- an ancient irc botnet☆12Updated 10 years ago
- ☆15Updated 8 years ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Shellcodes for different usecases☆9Updated 8 years ago