robertdavidgraham / helloluaLinks
Simple examples of integrating the Lua scripting language into C programs.
☆24Updated 7 years ago
Alternatives and similar repositories for hellolua
Users that are interested in hellolua are comparing it to the libraries listed below
Sorting:
- Parses DNS responses in a secure, rigorous manner☆22Updated 5 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 11 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 5 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 9 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- unix socket interface for C++ raw IP/IP6/UDP/TCP, Layer2 etc. framework☆42Updated 2 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- ☆12Updated 8 years ago
- A collection of shellcodes☆70Updated 13 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- A library for efficient interception of established TCP connections☆20Updated 10 years ago
- LKM Rootkit based on Diamorphine☆15Updated 7 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Windows login backdoor diagnostic tool☆11Updated 8 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆122Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 5 years ago
- A Unix rootkit☆16Updated 5 years ago
- ☆15Updated 9 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Updated 2 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆310Updated 12 years ago