stealth / harddns
RFC8484 and DoH/JSON resolver
☆40Updated last year
Alternatives and similar repositories for harddns:
Users that are interested in harddns are comparing it to the libraries listed below
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆97Updated last month
- Diaphora, a Free and Open Source program diffing tool☆22Updated 5 years ago
- kCFI Documentation☆14Updated 7 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆194Updated 5 months ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- ELF/PE/Mach-O parsing library☆50Updated last year
- Web of trust grapher☆39Updated 3 weeks ago
- ☆24Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- Synesthesia, implemented as Yices scripts☆93Updated 7 years ago
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 5 years ago
- Passive DHCP fingerprinting implementation☆51Updated 8 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- Transforms any file into a protected ELF executable☆28Updated 10 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- Mass DNS resolution tool☆36Updated 4 years ago
- a friendly wrapper around ptrace☆132Updated 3 years ago
- An experimental file formats playground☆86Updated last year
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago