robertdavidgraham / packetdump
A packet-sniffer for 10gig networks that writes to compressed files. I created this because
☆27Updated 7 years ago
Alternatives and similar repositories for packetdump:
Users that are interested in packetdump are comparing it to the libraries listed below
- Parses DNS responses in a secure, rigorous manner☆22Updated 4 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 7 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated 8 months ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- A collection of shellcodes☆67Updated 12 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- A rootkit implemented as a linux kernel module☆17Updated 9 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Transforms any file into a protected ELF executable☆28Updated 10 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- ELF packer for i386☆32Updated 9 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- ELF binary infector☆32Updated 13 years ago
- Sample programs demonstrating how to program in C using the Sockets API.☆36Updated 4 months ago
- sample linux x86_64 ELF virus☆53Updated 6 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- ☆17Updated 6 years ago
- Sample showing the use of CoGetInterceptor☆21Updated 3 years ago
- Heap analysis tooling for mempool☆13Updated 2 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- ☆36Updated 12 years ago