robertdavidgraham / robutilsLinks
A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.
☆11Updated 5 years ago
Alternatives and similar repositories for robutils
Users that are interested in robutils are comparing it to the libraries listed below
Sorting:
- Parses DNS responses in a secure, rigorous manner☆21Updated 5 years ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- Palantir is a Lua scriptable, portable, tiny reverse shell, using a human readable protocol written in C and Lua.☆18Updated 7 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- USB armory - boot loader☆37Updated 4 months ago
- My Packet Captures, Quagga Tutorial, and Cisco Reversing.☆27Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 3 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
- Reverset is a reverse engineering, and binary analysis tool.☆18Updated 5 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 4 months ago
- ☆13Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 8 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- USB armory - hardware control tool☆32Updated 5 months ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 10 months ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆10Updated last year
- runtime code injector for Linux☆27Updated 14 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆49Updated 4 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆18Updated this week
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- Sample programs demonstrating how to program in C using the Sockets API.☆37Updated 8 months ago