kimvais / ikeLinks
Minimalistic IKEv2 (RFC 5996) implementation in Python.
☆22Updated 7 years ago
Alternatives and similar repositories for ike
Users that are interested in ike are comparing it to the libraries listed below
Sorting:
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Updated 12 years ago
- Main repository to pull all Cisco related projects.☆15Updated 8 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 8 years ago
- ☆35Updated 13 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- IPSec testing tool☆19Updated last year
- Plugins and signatures☆14Updated 6 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- ☆25Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- lte security☆41Updated 10 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Passive DHCP fingerprinting implementation☆50Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- ssh key exchange layer for scapy☆13Updated 11 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Updated 7 years ago
- Static and Dynamic exploit analysis framework.☆23Updated 11 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 8 years ago
- BGP Route Leaks Detection☆71Updated 6 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- ☆57Updated 11 years ago