kimvais / ikeLinks
Minimalistic IKEv2 (RFC 5996) implementation in Python.
☆21Updated 7 years ago
Alternatives and similar repositories for ike
Users that are interested in ike are comparing it to the libraries listed below
Sorting:
- CAPWAP DTLS MITM (Man-In-The-Middle) Proxy☆11Updated 10 years ago
- Diameter TCP to SCTP proxy☆14Updated 13 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 11 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- ☆17Updated 6 years ago
- Plugins and signatures☆14Updated 6 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- Decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, can also remove IEEE 802.1Q (virtual lan) header. Works w…☆32Updated 6 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 8 years ago
- ssh key exchange layer for scapy☆13Updated 10 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 7 years ago
- lte security☆41Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 8 months ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 3 years ago
- Apache use after free bug infos / ASAN stack traces☆66Updated 6 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago