nfirvine / croy-sharkLinks
Clash Royale protocol dissector for Wireshark
☆15Updated 8 years ago
Alternatives and similar repositories for croy-shark
Users that are interested in croy-shark are comparing it to the libraries listed below
Sorting:
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- (◍•﹏•) - Hi, I'm Eve☆21Updated 7 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- A collection of crackmes☆40Updated 7 months ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 9 months ago
- Wardriving ekoparty☆15Updated 7 years ago
- ☆65Updated 8 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- Network white noise collector☆19Updated 9 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago
- lulz: automated webstalking tool☆52Updated 9 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆49Updated 10 years ago
- ☆15Updated 8 years ago
- An educational Linux Kernel Rootkit☆33Updated 3 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago