jedisct1 / byteripperLinks
A tool to extract code from individual functions in a library.
☆16Updated 6 months ago
Alternatives and similar repositories for byteripper
Users that are interested in byteripper are comparing it to the libraries listed below
Sorting:
- A DNS library for Rust.☆23Updated 2 months ago
- A deceptively simple way to add a configuration file to a command-line application.☆16Updated 3 months ago
- System tracer implementation in Rust☆32Updated 8 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- C implementation of the BlaBla20 cipher☆9Updated 4 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- DNS Stamp encoding/decoding library for node☆15Updated 3 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 7 years ago
- A simple implementation of an 'echo' (port 7) server using epoll (Linux), kqueue (FreeBSD), and IOCompletionPorts (Windows).☆13Updated 6 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- ☆16Updated 7 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- tamper resistant audit log☆18Updated 6 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- ☆36Updated 12 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- Plug-and-play IP rate limiter in C☆24Updated 4 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Library to support various Hash-based Message Authentication Codes (HMAC)☆10Updated 7 months ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated last month