kimvais / ikeLinks
Minimalistic IKEv2 (RFC 5996) implementation in Python.
☆22Updated 7 years ago
Alternatives and similar repositories for ike
Users that are interested in ike are comparing it to the libraries listed below
Sorting:
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Updated 12 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Main repository to pull all Cisco related projects.☆15Updated 8 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Passive DHCP fingerprinting implementation☆50Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 8 years ago
- lte security☆41Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 8 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 8 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- ☆35Updated 13 years ago
- ☆24Updated 10 years ago
- random python stuff☆26Updated 9 years ago
- IPSec testing tool☆19Updated last year
- A simple C library for entropy measurement of byte streams and other data.☆14Updated 5 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 11 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- Plugins and signatures☆14Updated 6 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Updated 10 years ago
- Proof-of-Concept code for exploits☆82Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago
- ☆57Updated 11 years ago
- A python module that monkey patches pexpect mainly for binary transfers.☆18Updated 6 years ago