pissedoffadmins / rfc-reader
this is a command line (linux, osx) rfc reader
☆15Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for rfc-reader
- runtime code injector for Linux☆27Updated 13 years ago
- Alternative hexdump.☆15Updated 8 years ago
- ☆35Updated 12 years ago
- A tool for patching/injecting code into elf binaries.☆12Updated 12 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- ☆20Updated 10 months ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- python based backdoor software☆17Updated 13 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆28Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆21Updated 10 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 7 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆127Updated 11 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- A collection of shellcodes☆67Updated 12 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 8 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- See my shmoocon talk repo for updated code:☆25Updated 11 years ago
- LibreSSL with a backdoor in RSA key generation☆16Updated 8 years ago