A high level C++ network packet sniffing and crafting library
☆312Dec 6, 2025Updated 4 months ago
Alternatives and similar repositories for libcrafter
Users that are interested in libcrafter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- You can find a lot of libcrafter code right over here☆54Dec 6, 2025Updated 4 months ago
- High-level, multiplatform C++ network packet sniffing and crafting library.☆1,989Dec 12, 2025Updated 3 months ago
- PcapPlusPlus is a multiplatform C++ library for capturing, parsing and crafting of network packets. It is designed to be efficient, power…☆3,073Updated this week
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- KPlugs is a Linux kernel module which provides an interface for dynamically executing scripts inside the Linux kernel.☆147Oct 12, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tracebox, a middlebox detection tool☆172Jul 4, 2018Updated 7 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 10 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago
- Sniffer for TCP and UDP protocols. Outputs intercepted packages ( C++, Linux )☆11May 5, 2015Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Benchmarking implementations of pflang, the pcap filter language☆26Dec 5, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆147Jul 30, 2017Updated 8 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 11 months ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Yet another Android Dex bytecode Disassembler: a static Android app disassembler for fast class and method signature extraction and code …☆30Dec 15, 2018Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆109Apr 13, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Distributed, Search-Optimized Full Packet Capture System☆245Apr 17, 2023Updated 2 years ago
- Quantum Insert☆214Jan 2, 2019Updated 7 years ago
- Open source exploit framework made in C#☆54Jan 27, 2025Updated last year
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Readline completion for Lua: DEPRECATED IN FAVOUR OF http://smbolton.com/lua.html☆21May 19, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols☆1,156Jul 26, 2024Updated last year
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Jul 15, 2018Updated 7 years ago
- radare2 + miasm2 = ♥☆103Jan 22, 2020Updated 6 years ago
- tcp reassembly☆28Feb 15, 2022Updated 4 years ago
- IDA Python Scripts☆46Jul 19, 2009Updated 16 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆325Aug 12, 2019Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year