jogonba2 / Syn-Flood
Syn flood implementation with raw sockets.
☆13Updated 10 years ago
Alternatives and similar repositories for Syn-Flood:
Users that are interested in Syn-Flood are comparing it to the libraries listed below
- Cgiemail - Source Code Disclosure/LFI☆15Updated 8 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 7 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Shellcodes for different usecases☆9Updated 8 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- sudo almost as fake as your ma☆16Updated 8 years ago
- MiKey is a minimal and modular Linux keylogger. It provides a toolkit that monitors and records all activities performed on a computer. I…☆14Updated 11 years ago
- Chrome extension for blocking x-origin cookies☆11Updated 8 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 13 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆40Updated 13 years ago
- For BurpSuite Plugins☆11Updated 9 years ago
- OS X rootkit loader version #2☆12Updated 10 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Updated 7 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆14Updated 2 years ago
- ☆15Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated last month
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- OS X rootkit loader version #1