robert / how-to-build-a-tcp-proxyLinks
How to build a TCP proxy, step by step
☆71Updated 5 years ago
Alternatives and similar repositories for how-to-build-a-tcp-proxy
Users that are interested in how-to-build-a-tcp-proxy are comparing it to the libraries listed below
Sorting:
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)☆15Updated 5 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24Updated 7 years ago
- a tool to identify cryptographic hashes, encodings, and other artifacts in a byte stream according to traces of its representation☆135Updated 2 months ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 6 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- A PoC for CVE-2020-0601☆338Updated 2 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 3 months ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- A collection of techniques commonly used in malware to accomplish core tasks.☆83Updated 6 years ago
- ☆166Updated 6 years ago
- A minimal DNS service that can provide spoofed replies☆102Updated 2 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 7 months ago
- A simple backdoor for servers and embedded systems.☆13Updated 3 months ago
- A simple tool to convert the IP to a DWORD IP☆143Updated 3 years ago
- A workshop on Packet Crafting using Scapy.☆158Updated 5 years ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆80Updated 6 years ago
- simple shellcode generator☆114Updated 8 years ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆166Updated 7 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- A proof of concept project that demonstrates oWASP.org's top 10 web vulnerabilities☆21Updated 10 years ago
- DNS server limitation mapper☆26Updated 7 years ago
- A python flask app that is purposefully vulnerable to SQL injection and XSS attacks. To be used for demonstrating attacks☆71Updated last year
- A XPath injection demonstration application☆22Updated 5 years ago
- scrapped ideas and garbage code☆13Updated 4 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 7 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆69Updated 8 years ago