guedou / GreHack16_scapy-handsonLinks
Scapy hands-on at #GreHack16
☆15Updated 8 years ago
Alternatives and similar repositories for GreHack16_scapy-handson
Users that are interested in GreHack16_scapy-handson are comparing it to the libraries listed below
Sorting:
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- ☆27Updated 8 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- Simple web app for displaying cowrie data in your browser☆12Updated 9 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- Beagle(bone) in the Middle☆25Updated 4 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 8 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Puny Domain Name Check☆37Updated 6 years ago
- ☆12Updated 8 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago