pstavirs / pddLinks
Packet Dump Decode - one-click packet hexdump decode
☆17Updated 10 years ago
Alternatives and similar repositories for pdd
Users that are interested in pdd are comparing it to the libraries listed below
Sorting:
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- A Unix rootkit☆16Updated 5 years ago
- ☆27Updated 8 years ago
- See here:☆42Updated 13 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 14 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- ☆38Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- The Horrific Omnipotent Rootkit☆23Updated 8 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆23Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- Various pentest scripts☆14Updated 11 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12Updated 10 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- Create shellcode from executable or assembly code☆12Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago