rieck / derrickLinks
A Simple Network Stream Recorder
☆35Updated 6 years ago
Alternatives and similar repositories for derrick
Users that are interested in derrick are comparing it to the libraries listed below
Sorting:
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- ☆25Updated 10 years ago
- ☆35Updated 13 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Updated 3 years ago
- Alternative hexdump.☆15Updated 10 years ago
- swffile.py - SWF file parser module in Python☆28Updated 9 years ago
- ☆13Updated 8 years ago
- A library for efficient interception of established TCP connections☆20Updated 10 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Updated last year
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago
- Binary Analysis Platform☆74Updated 12 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Updated 8 years ago
- ☆27Updated 9 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 11 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Fork/mirror of Darcs repo for PyFlag (Forensic and Log Analysis GUI)☆36Updated 15 years ago
- Papers on reverse engineering and assembly language programming☆38Updated 5 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 10 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 11 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- ☆48Updated 3 years ago