A simple stupid VPN implementation.
☆21Jul 24, 2014Updated 11 years ago
Alternatives and similar repositories for S-VPN
Users that are interested in S-VPN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Windows设备驱动开发 光盘(示例代码)☆10Jan 14, 2013Updated 13 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- mod_asn, an Apache module to look up routing data.☆12Feb 23, 2017Updated 9 years ago
- stuff from my ToorCon 2015 talk☆14Oct 27, 2015Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- Final Transparent encrypted version☆14Jan 10, 2017Updated 9 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Sep 28, 2015Updated 10 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- ☆12Dec 15, 2016Updated 9 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- The old integrity check bypass made by dude719.☆13Apr 2, 2016Updated 9 years ago
- Virtual Machine Monitor/386 bare metal hypervisor. Run vm86 mode processes on a 386☆13Mar 16, 2016Updated 10 years ago
- An attempt to reverse-engineer the protocol for Diablo III, allowing a MITM attack on the game by intercepting packets as they pass throu…☆13Jun 21, 2012Updated 13 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- ☆18Mar 20, 2017Updated 9 years ago
- 文件透明过滤驱动☆15Mar 31, 2013Updated 12 years ago
- A remote desktop control suite☆16Jun 28, 2014Updated 11 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- NTP Scanner and 'monlist' checker☆13Sep 1, 2015Updated 10 years ago
- A library to capture raw keyboard and mouse events under Windows. Inspired by HIDMacros.☆18May 3, 2011Updated 14 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Dec 17, 2025Updated 3 months ago
- One time password authentication for Windows remote desktop☆16Aug 13, 2015Updated 10 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- Utility library in C++ (containers, memory management, inter-process communication)☆26Apr 28, 2018Updated 7 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- small package for reading pipe data☆11Jan 5, 2017Updated 9 years ago