hugsy / sstoperLinks
SSTP VPN client for Linux
☆18Updated 4 years ago
Alternatives and similar repositories for sstoper
Users that are interested in sstoper are comparing it to the libraries listed below
Sorting:
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated 2 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Updated 11 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- ☆10Updated 9 years ago
- ☆24Updated 11 years ago
- ☆24Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Updated 11 years ago
- ☆12Updated 8 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- python based backdoor software☆17Updated 13 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago