rootfoo / blackmamba
Blackmamba is a new concurrent networking library for Python. Blackmamba was built from the ground up leveraging the power of epoll and coroutines.
☆43Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for blackmamba
- ☆26Updated 7 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20Updated 13 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- A command line tool to enumerate TLS cipher-suites supported by a server☆34Updated 7 years ago
- An evolving hacking framework written in python☆11Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 8 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆30Updated 8 years ago
- Kippo configured to be a backdoored netscreen☆10Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 5 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆10Updated 10 years ago
- A better SSL cipher checker using gnutls☆27Updated 7 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆27Updated 13 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Updated 10 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 2 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago