stealth / harddns
RFC8484 and DoH/JSON resolver
☆40Updated last year
Alternatives and similar repositories for harddns
Users that are interested in harddns are comparing it to the libraries listed below
Sorting:
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆77Updated 5 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- DHCP option injector☆42Updated 4 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- ☆34Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- lte security☆41Updated 9 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆194Updated last week
- Host files with DNS☆32Updated 9 years ago
- Collection of "bad" packets in PCAPs that can be used for testing software☆18Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- ☆36Updated 12 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- opmsg p2p transport network☆71Updated 6 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 8 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Repository to store unique seeds for DNS server fuzzing☆45Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- ☆29Updated 6 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- ☆30Updated 10 years ago