jedisct1 / byteripper
A tool to extract code from individual functions in a library.
☆16Updated 3 months ago
Alternatives and similar repositories for byteripper:
Users that are interested in byteripper are comparing it to the libraries listed below
- A DNS library for Rust.☆23Updated last month
- System tracer implementation in Rust☆32Updated 8 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 7 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆15Updated this week
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 8 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 7 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 7 years ago
- Library to support various Hash-based Message Authentication Codes (HMAC)☆10Updated 4 months ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- BitBender is a byte manipulation tool☆12Updated 7 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆14Updated 2 years ago
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆19Updated 6 years ago
- A space-optimized binary tree for storing IP addresses☆13Updated 7 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- A simple implementation of an 'echo' (port 7) server using epoll (Linux), kqueue (FreeBSD), and IOCompletionPorts (Windows).☆13Updated 6 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 10 years ago
- Simple examples of integrating the Lua scripting language into C programs.☆23Updated 6 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- ☆16Updated 7 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- Scripts that I used to write a blog post about section 7.24.1(2) of C11☆11Updated 8 years ago