robertdavidgraham / packetdump
A packet-sniffer for 10gig networks that writes to compressed files. I created this because
☆27Updated 7 years ago
Alternatives and similar repositories for packetdump:
Users that are interested in packetdump are comparing it to the libraries listed below
- Parses DNS responses in a secure, rigorous manner☆21Updated 4 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 7 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated 9 months ago
- A rootkit implemented as a linux kernel module☆17Updated 9 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- A collection of shellcodes☆68Updated 12 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- ELF binary infector☆32Updated 13 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 7 years ago
- Sample showing the use of CoGetInterceptor☆21Updated 4 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 4 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- Passive DHCP fingerprinting implementation☆51Updated 8 years ago
- A linux rootkit works on kernel 4.0.X or higher☆36Updated 8 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 4 months ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago