robertdavidgraham / robutilsLinks
A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.
☆11Updated 5 years ago
Alternatives and similar repositories for robutils
Users that are interested in robutils are comparing it to the libraries listed below
Sorting:
- Parses DNS responses in a secure, rigorous manner☆21Updated 5 years ago
- Palantir is a Lua scriptable, portable, tiny reverse shell, using a human readable protocol written in C and Lua.☆19Updated 7 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 3 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- Sample programs demonstrating how to program in C using the Sockets API.☆36Updated 10 months ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 11 months ago
- ☆13Updated 9 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- My Packet Captures, Quagga Tutorial, and Cisco Reversing.☆28Updated 7 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 10 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- DFF (Digital Forensics Framework)☆11Updated 4 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- USB armory - boot loader☆36Updated 3 weeks ago
- ☆22Updated 4 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆49Updated 4 years ago