A differential fuzzing framework for the QUIC protocol
☆19Nov 21, 2023Updated 2 years ago
Alternatives and similar repositories for DPIFuzz
Users that are interested in DPIFuzz are comparing it to the libraries listed below
Sorting:
- Attacks against QUIC (CVE-2022-30591)☆25Dec 31, 2022Updated 3 years ago
- QUICforge is an experimental python tool for request forgery attacks with QUIC☆24May 1, 2022Updated 3 years ago
- ☆27Jun 7, 2022Updated 3 years ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Aug 11, 2025Updated 6 months ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆21Apr 11, 2024Updated last year
- 通过 ebpf(bcc) 在 TCP 包中插入 TOA,实现任意 TOA 伪造☆28Dec 12, 2023Updated 2 years ago
- ☆27Jun 29, 2023Updated 2 years ago
- This tool presents a novel approach to bolstering network protocol verification by integrating the Shadow network simulator with the Ivy …☆42Updated this week
- A Multipath TCP python support library 🐍☆10Feb 5, 2023Updated 3 years ago
- Code for Tracing Transactions Across Cryptocurrency Ledgers (which focuses on ShapeShift)☆11Oct 15, 2019Updated 6 years ago
- Diameter TCP to SCTP proxy☆13Feb 4, 2012Updated 14 years ago
- ☆13Jan 6, 2022Updated 4 years ago
- SHA and Shake for scala☆13Feb 13, 2026Updated 2 weeks ago
- BigInteger for scala with very fast modPow☆10Feb 13, 2026Updated 2 weeks ago
- Lightweight, model-agnostic chat history compression (trim + summarize) for AI assistants.☆22Sep 14, 2025Updated 5 months ago
- Open source RAN UE centric security testing software.☆14Feb 13, 2026Updated 2 weeks ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- Translation of SSH3 project (from commit c39bb79cdce479f6095ab154a32a168e14d73b57) to Python 3 library. Check the original project for mo…☆14Jan 7, 2024Updated 2 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenarios☆15Jan 17, 2025Updated last year
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- overlay filesystem userspace utilities, include fsck.overlay which is used to check and optionally repair underlying directories of overl…☆14Jun 8, 2021Updated 4 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- KeyTrap (DNSSEC)☆44Feb 18, 2024Updated 2 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- a rebuild of marionette, encrypted programmable traffic obfuscation proxy☆12Nov 29, 2023Updated 2 years ago
- ☆11Oct 10, 2023Updated 2 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- ARF is an agentic reliability intelligence platform that separates decision intelligence (OSS) from governed execution (Enterprise), enab…☆19Updated this week
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 5 years ago
- Google Client Implementation in Scapy☆14Jun 26, 2018Updated 7 years ago
- Useful tools for reverse out of the box (Unix compatible)☆11Aug 31, 2024Updated last year
- 域名接管漏洞,批量检测工具☆11Oct 29, 2020Updated 5 years ago
- Sovereign Spatial Procedural Knowledge System (K3D): GPU-accelerated AI with procedural sovereignty. Reference implementation for W3C PM-…☆31Updated this week
- ☆71Nov 8, 2021Updated 4 years ago
- pypassport is library to read and parse biometric passport.☆13Nov 15, 2024Updated last year
- PoC of five Slow Rate HTTP/2 DoS attacks seen in a research paper☆10Mar 31, 2018Updated 7 years ago
- ☆18Jan 12, 2025Updated last year