richmr / ChaosDriveLinks
USB shenanigans
☆16Updated 5 years ago
Alternatives and similar repositories for ChaosDrive
Users that are interested in ChaosDrive are comparing it to the libraries listed below
Sorting:
- ☆15Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- ☆30Updated 10 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Web of trust grapher☆38Updated last week
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 10 years ago
- LD_PRELOAD library for intercepting the plain text of SSL connections made with openssl☆24Updated 10 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆26Updated 6 years ago
- PoC code using debugfs to store files in memory and execute them☆26Updated 7 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- ☆12Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- ☆36Updated 5 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆17Updated 7 years ago
- Notebook collection☆10Updated 6 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago