rootfoo / blackmambaLinks
Blackmamba is a new concurrent networking library for Python. Blackmamba was built from the ground up leveraging the power of epoll and coroutines.
☆44Updated 12 years ago
Alternatives and similar repositories for blackmamba
Users that are interested in blackmamba are comparing it to the libraries listed below
Sorting:
- ☆27Updated 8 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Updated 11 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆104Updated 9 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- Kippo configured to be a backdoored netscreen☆11Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- DEPRECATED USE v3!☆59Updated 10 years ago
- ☆26Updated 8 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20Updated 14 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 16 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- ☆44Updated 8 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 10 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 9 years ago
- Indicator of Compromise Mapping Service☆12Updated 11 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 6 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Public version of PDF X-RAY☆59Updated 13 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago
- Network Security Monitoring Framework☆48Updated 13 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Malware Analysis Zoo☆25Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago