stealth / harddnsLinks
RFC8484 and DoH/JSON resolver
☆40Updated last year
Alternatives and similar repositories for harddns
Users that are interested in harddns are comparing it to the libraries listed below
Sorting:
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆77Updated 5 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- ☆34Updated 7 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- unofficial grsecurity gpl release☆22Updated 6 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- opmsg p2p transport network☆71Updated 6 years ago
- ☆29Updated 6 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- Diaphora, a Free and Open Source program diffing tool☆23Updated 5 years ago
- Web of trust grapher☆38Updated 2 weeks ago
- Collection of scripts for radare2☆28Updated 6 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆195Updated last month
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- kCFI Documentation☆14Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- TPM 1.2 management tool with an easy-to-use graphical user interface☆39Updated 2 years ago
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 5 years ago
- ☆36Updated 12 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆57Updated 6 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Host files with DNS☆32Updated 9 years ago