robertdavidgraham / packetdumpLinks
A packet-sniffer for 10gig networks that writes to compressed files. I created this because
☆27Updated 8 years ago
Alternatives and similar repositories for packetdump
Users that are interested in packetdump are comparing it to the libraries listed below
Sorting:
- runtime code injector for Linux☆27Updated 14 years ago
- Parses DNS responses in a secure, rigorous manner☆21Updated 5 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- A library for efficient interception of established TCP connections☆20Updated 10 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- LKM Rootkit based on Diamorphine☆15Updated 7 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆122Updated 5 years ago
- Passive DHCP fingerprinting implementation☆50Updated 9 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 11 years ago
- A collection of shellcodes☆70Updated 13 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- ELF binary infector☆33Updated 14 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Simple examples of integrating the Lua scripting language into C programs.☆23Updated 6 years ago
- unix socket interface for C++ raw IP/IP6/UDP/TCP, Layer2 etc. framework☆42Updated 2 years ago
- Sample showing the use of CoGetInterceptor☆22Updated 4 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 9 years ago
- ☆35Updated 13 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- An ELF parasite command injector.☆34Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 11 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Linux backdoor using ICMP payload for activation☆11Updated 10 years ago