Sample c network programming
☆97Sep 7, 2018Updated 7 years ago
Alternatives and similar repositories for c-network-programming-best-snipts
Users that are interested in c-network-programming-best-snipts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- Tools and library to manipulate EFI variables.☆10Mar 26, 2026Updated 2 weeks ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 8 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 9 years ago
- A program that descrypts C type declarations. Implemented as an exercise for "Expert C Programming" book.☆12Aug 16, 2015Updated 10 years ago
- DNS DDoS Defence and Countermeasure☆14Feb 17, 2016Updated 10 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 11 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆14Feb 16, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated 2 years ago
- Attack script and scanner for DNS based spoofed amplification attacks.☆20Oct 16, 2016Updated 9 years ago
- A kernel level driver for Windows built to configure the Blue Screen Of Death☆21Jul 30, 2021Updated 4 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- TRS-80 Star Trek 2014 !!☆17Nov 20, 2025Updated 4 months ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆19Nov 24, 2013Updated 12 years ago
- A simple tool for enumerating dynamic endpoints on a DCE/RPC remote or local endpoint mapper.☆15Oct 9, 2020Updated 5 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- Locates installed Perl modules.☆22Apr 16, 2023Updated 2 years ago
- Python pcap sanitizer☆22Sep 2, 2022Updated 3 years ago
- Linux shell scripts☆26Sep 25, 2016Updated 9 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Anatomy of a linux kernel development☆27Mar 30, 2017Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Nov 12, 2014Updated 11 years ago
- Reversing and reimplementing "powercfg /requests" using Native API☆30Jul 25, 2024Updated last year
- A utility to dump memory of unixy processes☆19Apr 5, 2022Updated 4 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Shameless copy of http://swtch.com/libtask/ and/or http://code.google.com/p/libtask/☆18Aug 1, 2012Updated 13 years ago