robertdavidgraham / robutilsLinks
A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.
☆12Updated 5 years ago
Alternatives and similar repositories for robutils
Users that are interested in robutils are comparing it to the libraries listed below
Sorting:
- Parses DNS responses in a secure, rigorous manner☆22Updated 5 years ago
- A lightweight/secure honeypot using Lua scripts.☆26Updated 4 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Palantir is a Lua scriptable, portable, tiny reverse shell, using a human readable protocol written in C and Lua.☆18Updated 7 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Updated 5 years ago
- Passive DHCP fingerprinting implementation☆52Updated 9 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆10Updated 6 years ago
- My Packet Captures, Quagga Tutorial, and Cisco Reversing.☆28Updated 7 years ago
- ☆13Updated 9 years ago
- Network Tools☆34Updated 2 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Extract, defang, resolve names and IPs from text☆23Updated this week
- PCILeech HP iLO4 Service☆24Updated 7 years ago
- ROP gadget finder and analysis in pure Javascript☆27Updated 3 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 10 months ago
- Architectural privilege escalation on x86☆61Updated 7 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
- ☆34Updated 6 years ago
- Network Traffic Fuzzer☆17Updated last year
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Solutions for various crackmes☆20Updated 13 years ago
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- Carving tool based in Radare2 & Yara☆17Updated 7 years ago