robertdavidgraham / helloluaLinks
Simple examples of integrating the Lua scripting language into C programs.
☆23Updated 6 years ago
Alternatives and similar repositories for hellolua
Users that are interested in hellolua are comparing it to the libraries listed below
Sorting:
- Parses DNS responses in a secure, rigorous manner☆21Updated 5 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 11 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- A collection of shellcodes☆69Updated 13 years ago
- ☆12Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 5 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Historical Tracking of MAC Address Assignments☆35Updated this week
- ☆20Updated last year
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆61Updated 12 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆17Updated 8 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- ☆35Updated 13 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 5 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago