MemcacheD Proof of Concept
☆22Mar 6, 2018Updated 8 years ago
Alternatives and similar repositories for memcached-PoC
Users that are interested in memcached-PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- ☆14Apr 25, 2019Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Simple dos attack utility☆44Feb 12, 2020Updated 6 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 11 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- 目前以网络通信和协议,防火墙代码居多☆15Aug 7, 2017Updated 8 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- Simple implementation of a p2p network in Go☆14Apr 11, 2018Updated 7 years ago
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆19Nov 24, 2013Updated 12 years ago
- Script that dumps running process memory from Linux systems using /proc.☆80Aug 6, 2013Updated 12 years ago
- ☆12Jul 17, 2017Updated 8 years ago
- The Router Exploitation Framework☆12Nov 10, 2017Updated 8 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- Locates installed Perl modules.☆22Apr 16, 2023Updated 2 years ago
- Python pcap sanitizer☆22Sep 2, 2022Updated 3 years ago
- Linux shell scripts☆26Sep 25, 2016Updated 9 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Java Web shell project☆12Oct 22, 2021Updated 4 years ago
- Netwitness Maltego integration Project☆18May 9, 2017Updated 8 years ago
- ☆18Jun 14, 2023Updated 2 years ago
- IP Country Database and SDK☆15Apr 13, 2016Updated 9 years ago
- 安全态势感知可视化demo☆11Nov 1, 2018Updated 7 years ago
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API☆1,393Dec 2, 2022Updated 3 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Server☆38Mar 13, 2018Updated 8 years ago