robertdavidgraham / dnsparse
Parses DNS responses in a secure, rigorous manner
☆22Updated 4 years ago
Related projects: ⓘ
- Prototype program to decode a video file looking for exploits/malware.☆16Updated 4 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 7 years ago
- Identifies Bluetooth Low-energy devices☆15Updated 4 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Heap analysis tooling for mempool☆12Updated 2 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 7 years ago
- Passive DHCP fingerprinting implementation☆49Updated 8 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated 2 months ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 2 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆16Updated 5 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆21Updated 6 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆15Updated 3 years ago
- Simple examples of integrating the Lua scripting language into C programs.☆24Updated 5 years ago
- A rootkit implemented as a linux kernel module☆16Updated 9 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Splits a single TCP port for a use with multiple services (in the spirit of sslh)☆35Updated 7 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆22Updated 8 months ago
- A non-math, but still technical, guide to cryptography☆24Updated 4 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- Sample showing the use of CoGetInterceptor☆21Updated 3 years ago
- Transforms any file into a protected ELF executable☆27Updated 9 years ago
- ☆24Updated 9 years ago
- ☆11Updated this week