TGC is the TCP Gender Changer
☆21Jan 3, 2019Updated 7 years ago
Alternatives and similar repositories for tgcd
Users that are interested in tgcd are comparing it to the libraries listed below
Sorting:
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- A small Alpine Linux based toolbox for Docker on CoreOS with various admin tools☆12Apr 28, 2020Updated 5 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Attacks against weak 802.11 Random Number Generators☆24Feb 8, 2017Updated 9 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- Probably the first ELF binary infector ever created in Nim.☆28Jun 23, 2020Updated 5 years ago
- ☆30Apr 24, 2019Updated 6 years ago
- Helps with finding and registering categorized domains☆70May 6, 2021Updated 4 years ago
- An ELF parasite command injector.☆34Oct 24, 2017Updated 8 years ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- The weird and wonderful weapons of RWBY recreated in Garry's Mod using Expression 2.☆11Sep 2, 2015Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- ☆11Nov 7, 2025Updated 3 months ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- A bunch of scripts I use to work with urlscan.io☆35Oct 25, 2019Updated 6 years ago
- Linux Rootkit Scanner☆88Jan 24, 2022Updated 4 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Apr 18, 2013Updated 12 years ago
- PowerCLI Scripts☆14Aug 10, 2019Updated 6 years ago
- Add-On mod for AppliedEnergistics and Logistics Pipes☆10Jun 8, 2021Updated 4 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- HarmTrace Base: Parsing and unambiguously representing musical chords☆11Oct 21, 2022Updated 3 years ago
- This script is written in Perl this is very good admin page finder.☆11Aug 29, 2020Updated 5 years ago
- A hacky Python script to make musical Desmos graphs☆10Apr 15, 2020Updated 5 years ago
- Flink state cache☆11Sep 24, 2020Updated 5 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- This a repo to help people to set up their own VPN service on their vps☆15Sep 12, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- This is a simple mix task to version bump a mix project.☆11Feb 18, 2020Updated 6 years ago
- ☆10Dec 7, 2015Updated 10 years ago
- ☆10Jun 2, 2022Updated 3 years ago
- ☆16May 13, 2021Updated 4 years ago
- Mode-line stopwatch in Emacs☆12Aug 27, 2019Updated 6 years ago