robertdavidgraham / hellolua
Simple examples of integrating the Lua scripting language into C programs.
☆23Updated 6 years ago
Alternatives and similar repositories for hellolua:
Users that are interested in hellolua are comparing it to the libraries listed below
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 7 years ago
- Parses DNS responses in a secure, rigorous manner☆21Updated 4 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- A tool to extract code from individual functions in a library.☆16Updated 4 months ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆19Updated 7 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 7 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- A simple implementation of an 'echo' (port 7) server using epoll (Linux), kqueue (FreeBSD), and IOCompletionPorts (Windows).☆13Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- See here:☆42Updated 12 years ago
- A collection of shellcodes☆68Updated 12 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Shellcodes for different usecases☆9Updated 8 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Updated 2 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago