Packet-o-matic NG !
☆65Jan 19, 2026Updated 4 months ago
Alternatives and similar repositories for pom-ng
Users that are interested in pom-ng are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Turns virtual usbredir connections into physical ones☆14Jun 17, 2020Updated 5 years ago
- Swipe Right On A New Peering Relationship☆15Jun 21, 2020Updated 5 years ago
- ☆17Sep 26, 2016Updated 9 years ago
- Utilities for Broadcom-based cable modems☆163Feb 26, 2025Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Extract LZMA sections from cable modem firmware images☆20Nov 18, 2013Updated 12 years ago
- ☆24Apr 17, 2021Updated 5 years ago
- PoC to append and extract data at the end of an ELF file☆20Aug 20, 2017Updated 8 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 9 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- HTTP host monitoring and management through DNS☆10Aug 31, 2021Updated 4 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- ☆25Jul 20, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- 4.05 kernel dumping POC with patches☆13Jun 5, 2018Updated 7 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆35Nov 26, 2018Updated 7 years ago
- ☆19Apr 21, 2026Updated 3 weeks ago
- NSA headline generator☆32Feb 11, 2014Updated 12 years ago
- Out-of-tree module for GNU Radio containing a complete OFDM implementation including GUI for reasearch and teaching☆16Mar 4, 2018Updated 8 years ago
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- An easy way for the NSA to see what's going on in our Django projects.☆16Jun 12, 2013Updated 12 years ago
- !!! Deprecated See ESPloitV2 !!! Original PoC(Released: Sep 11, 2016) - WiFi controlled keystroke injection Using ESP8266 and 32u4 based…☆49Jul 12, 2017Updated 8 years ago
- Simple proxy designed to intercept and modify connections on the transport level. This means you can also modify TLS raw bytes.☆17Dec 13, 2021Updated 4 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated last year
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 10 years ago
- Creating executables from ELF-coredumps☆10Dec 7, 2015Updated 10 years ago
- Leap Motion data relay for Google Glass.☆15Aug 4, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 10 years ago
- Server-side component of the Vault PKI certificate distribution system.☆15Jun 27, 2020Updated 5 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- QEMU bare metal test for validating TrustZone support☆11Apr 23, 2015Updated 11 years ago
- Version of QEMU modded to run WinRT☆13Jul 9, 2017Updated 8 years ago
- A pure Lua implementation of bk-trees, created because it was needed for fuzzy term matching.☆13Feb 22, 2022Updated 4 years ago
- ☆12Dec 4, 2018Updated 7 years ago