nfirvine / croy-shark
Clash Royale protocol dissector for Wireshark
☆15Updated 8 years ago
Alternatives and similar repositories for croy-shark:
Users that are interested in croy-shark are comparing it to the libraries listed below
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- Network white noise collector☆18Updated 8 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 8 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 6 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- Pcap javascript parser☆13Updated 6 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- Linux Code Injection Toolkit - Code interposition for Linux☆19Updated 13 years ago
- ☆13Updated 7 years ago
- An open radio protocol for transmitting UAV flight data in real time.☆11Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- ☆10Updated 9 years ago
- Grab functions from radare2☆10Updated 7 years ago
- A 'ladybird' badge for hardwear.io☆11Updated 9 years ago
- NetWatch System Management Mode VNC Server☆31Updated 15 years ago
- LibreSSL with a backdoor in RSA key generation☆16Updated 8 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- ☆15Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Trusted and Tested Core Dump Library☆8Updated 2 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Upload external IP so you can find your devices elsewhere☆15Updated 10 months ago
- GNURadio GRC files, Arduino code and scripts for preforming attacks on iSmartAlarm systems.☆21Updated 7 years ago
- Stolen WiFi Aggregate Tunneling Protocol Dæmon (RAID your internet connections!)☆17Updated 12 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- A collection of shellcodes☆67Updated 12 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago