robertdavidgraham / dnsparseLinks
Parses DNS responses in a secure, rigorous manner
☆22Updated 5 years ago
Alternatives and similar repositories for dnsparse
Users that are interested in dnsparse are comparing it to the libraries listed below
Sorting:
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 5 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 5 years ago
- Simple examples of integrating the Lua scripting language into C programs.☆24Updated 7 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Updated 5 years ago
- Passive DHCP fingerprinting implementation☆52Updated 9 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 9 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 11 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Sample programs demonstrating how to program in C using the Sockets API.☆39Updated last year
- Memfetch is a simple utility to dump all memory of a running process, either immediately or when a fault condition is discovered. It is a…☆42Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last week
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Updated 5 years ago
- Library and tools to access the GUID Partition Table (GPT) volume system format☆11Updated last month
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- DNS packet generator☆46Updated 4 months ago
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 4 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 10 years ago
- ☆35Updated 13 years ago
- ☆13Updated 9 years ago
- Yara filetype plugin for Vim.☆14Updated 4 years ago
- (Linux Kernel) Stack Monitoring Tool☆48Updated 4 years ago