lxfontes / tcp2sctpLinks
Diameter TCP to SCTP proxy
☆13Updated 13 years ago
Alternatives and similar repositories for tcp2sctp
Users that are interested in tcp2sctp are comparing it to the libraries listed below
Sorting:
- Load a .so from network and execute it inside a seccomp sandbox☆19Updated 10 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Updated 7 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- Symbol REPL☆31Updated 7 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Updated 6 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Tools for viewing and extracting HDD firmware files☆75Updated 10 years ago
- ☆57Updated 11 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- ☆16Updated 6 years ago
- ☆35Updated 13 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Updated 8 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- ☆12Updated 7 years ago
- ☆29Updated 6 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Updated 12 years ago
- Undefined Behaviour Snippets☆17Updated 8 years ago
- ☆24Updated 10 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Updated 4 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- ☆45Updated 7 years ago