lxfontes / tcp2sctpLinks
Diameter TCP to SCTP proxy
☆13Updated 13 years ago
Alternatives and similar repositories for tcp2sctp
Users that are interested in tcp2sctp are comparing it to the libraries listed below
Sorting:
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Updated 7 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Updated 10 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- ☆23Updated 4 years ago
- 0-ring rootkit revealer for Linux☆28Updated 6 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Updated 6 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- ☆19Updated 13 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Updated 8 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- CVE-2017-5721 Proof-of-Concept☆17Updated 7 years ago
- Awesome list for baseband modem resources.☆12Updated 7 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Symbol REPL☆31Updated 7 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- ☆12Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 5 months ago
- DRDoS UDP amplification tool☆17Updated 10 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- IDA Pro плагин для отображения результата Coresight ETM трассировки perf'а☆17Updated 7 years ago
- ☆57Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 9 years ago
- Tools for viewing and extracting HDD firmware files☆74Updated 10 years ago