linuxthor / metalfingerLinks
Linux kernel module to run a userspace application when a magic packet arrives
☆13Updated 7 years ago
Alternatives and similar repositories for metalfinger
Users that are interested in metalfinger are comparing it to the libraries listed below
Sorting:
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆13Updated 6 years ago
- Base64 Mutator☆13Updated 4 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- The hidden mstsc recorder player☆29Updated 5 years ago
- TN3270 MitM proxy and so much more☆14Updated 7 years ago
- module for certexfil☆15Updated 3 years ago
- Source code of my KeygenMe V7 challenge☆22Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- ☆47Updated 5 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 8 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- ☆22Updated last year
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- ☆36Updated 5 years ago
- 0-ring rootkit revealer for Linux☆28Updated 5 years ago
- ☆17Updated 5 years ago
- Extend WSH functionality with Registration-Free COM☆26Updated 8 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Hash collisions and their exploitations☆9Updated 3 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago