robertdavidgraham / sockdocLinks
Sample programs demonstrating how to program in C using the Sockets API.
☆39Updated last year
Alternatives and similar repositories for sockdoc
Users that are interested in sockdoc are comparing it to the libraries listed below
Sorting:
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Updated 5 years ago
- Parses DNS responses in a secure, rigorous manner☆22Updated 5 years ago
- RFC8484 and DoH/JSON resolver☆42Updated 2 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
- (Linux Kernel) Stack Monitoring Tool☆48Updated 3 years ago
- An ELF parasite command injector.☆34Updated 8 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆38Updated 6 years ago
- Copy of the contents at phrack.com☆41Updated 10 months ago
- An experimental file formats playground☆88Updated 2 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- ☆35Updated 13 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆41Updated 7 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Runtime Process Infection Made Easy☆188Updated last year
- A lightweight/secure honeypot using Lua scripts.☆26Updated 4 years ago
- Small script to determine valid immediate values for ARM assembly☆19Updated 6 years ago
- Historical Tracking of MAC Address Assignments☆40Updated this week
- Library and tools to access the GUID Partition Table (GPT) volume system format☆11Updated last month
- Binary Protocol Differ☆118Updated 5 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆63Updated 4 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆45Updated 9 years ago
- ELF binary infector☆33Updated 14 years ago
- Learn the very basics of different languages☆49Updated 9 months ago
- Memfetch is a simple utility to dump all memory of a running process, either immediately or when a fault condition is discovered. It is a…☆41Updated 7 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 13 years ago