nfirvine / croy-shark
Clash Royale protocol dissector for Wireshark
☆15Updated 8 years ago
Alternatives and similar repositories for croy-shark:
Users that are interested in croy-shark are comparing it to the libraries listed below
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 6 years ago
- Network white noise collector☆18Updated 8 years ago
- Tor relay certificate downloader☆11Updated 7 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- ☆13Updated 7 years ago
- A 'ladybird' badge for hardwear.io☆11Updated 8 years ago
- libnet provides a portable framework for low-level network packet construction.☆14Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- A collection of shellcodes☆67Updated 12 years ago
- ESP8266 Compatible IR Blaster that accepts HTTP commands for use with services like Amazon Echo☆10Updated 7 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- A sample android application implementing Moxie's Certificate Pinning Library☆8Updated 9 years ago
- Code etc for the badge creation and payloads☆11Updated 4 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- Pcap javascript parser☆13Updated 6 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- Trusted and Tested Core Dump Library☆8Updated 2 years ago
- encode/decode data using ASN.1 description☆13Updated last year
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago