pissedoffadmins / rfc-readerLinks
this is a command line (linux, osx) rfc reader
☆15Updated 10 years ago
Alternatives and similar repositories for rfc-reader
Users that are interested in rfc-reader are comparing it to the libraries listed below
Sorting:
- RESTful interface to your operating system shell☆19Updated 7 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆127Updated 11 years ago
- LibreSSL with a backdoor in RSA key generation☆17Updated 9 years ago
- An implementation of jpnevulator in Python☆21Updated 7 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Creating a reverse shell that works on multiple POSIX platforms☆8Updated 9 years ago
- PPPoAT - PPP over Any Transport☆22Updated 4 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- A 'ladybird' badge for hardwear.io☆11Updated 9 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 7 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- A remote access trojan over DNS☆95Updated 9 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- ☆20Updated last year
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- TCP tunnel with Vernam Encryption☆26Updated 10 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 11 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 10 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- See my shmoocon talk repo for updated code:☆25Updated 11 years ago
- A collection of shellcodes☆69Updated 13 years ago
- Socket over DNS tunnel☆83Updated 5 years ago
- Code etc for the badge creation and payloads☆11Updated 4 years ago
- Wireless Attacks in Python (Based on Blog Series)☆93Updated 11 years ago
- Reverse proxy for HTTPS services, with SSL verification.☆60Updated last year