robert / how-to-build-a-tcp-proxyLinks
How to build a TCP proxy, step by step
☆70Updated 4 years ago
Alternatives and similar repositories for how-to-build-a-tcp-proxy
Users that are interested in how-to-build-a-tcp-proxy are comparing it to the libraries listed below
Sorting:
- simple shellcode generator☆113Updated 8 years ago
- ☆16Updated 3 years ago
- scrapped ideas and garbage code☆13Updated 4 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 3 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24Updated 7 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆23Updated 10 years ago
- Examples repo for my "8 ways to spy your consoles" talk @ ZeroNights 2021☆11Updated 3 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- ☆20Updated 11 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- Modern Binary Exploitation write-ups.☆4Updated 5 years ago
- ☆25Updated 6 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆86Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 7 years ago
- unbox - Unpack and Decompile the $h*! out of things☆47Updated 7 years ago
- ☆43Updated 5 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆79Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- ☆20Updated 5 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆70Updated 5 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated last month
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆59Updated 12 years ago