robertdavidgraham / sockdocLinks
Sample programs demonstrating how to program in C using the Sockets API.
☆37Updated 8 months ago
Alternatives and similar repositories for sockdoc
Users that are interested in sockdoc are comparing it to the libraries listed below
Sorting:
- Parses DNS responses in a secure, rigorous manner☆21Updated 5 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 5 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- DNS packet generator☆46Updated last year
- (Linux Kernel) Stack Monitoring Tool☆45Updated 3 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- A kernel network manager with monitoring and limiting capabilities for macOS. #nsacyber☆107Updated 8 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- Memfetch is a simple utility to dump all memory of a running process, either immediately or when a fault condition is discovered. It is a…☆42Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 7 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- RFC8484 and DoH/JSON resolver☆40Updated 2 years ago
- ☆36Updated 12 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆121Updated 5 years ago
- hashdb block hash database tool and API☆44Updated 6 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- Runtime Process Infection Made Easy☆186Updated last year
- ip6.arpa scanner☆32Updated 8 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- An experimental file formats playground☆87Updated 2 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago