robertdavidgraham / packetdump
A packet-sniffer for 10gig networks that writes to compressed files. I created this because
☆27Updated 7 years ago
Alternatives and similar repositories for packetdump:
Users that are interested in packetdump are comparing it to the libraries listed below
- Parses DNS responses in a secure, rigorous manner☆21Updated 4 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 7 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- A collection of shellcodes☆68Updated 12 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- A tool to extract code from individual functions in a library.☆16Updated 4 months ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated 9 months ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 5 months ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- ☆12Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- ☆17Updated 6 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆21Updated 11 years ago
- ELF binary infector☆32Updated 13 years ago
- A linux rootkit works on kernel 4.0.X or higher☆36Updated 8 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- Library to support various Hash-based Message Authentication Codes (HMAC)☆10Updated 6 months ago