stephane-martin / cycaptureLinks
Cython bindings for libpcap and libtins
☆10Updated 9 years ago
Alternatives and similar repositories for cycapture
Users that are interested in cycapture are comparing it to the libraries listed below
Sorting:
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- IPSec testing tool☆19Updated last year
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Updated 7 years ago
- runtime code injector for Linux☆26Updated 14 years ago
- Static and Dynamic exploit analysis framework.☆23Updated 11 years ago
- random python stuff☆26Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Nano meterpreter shell based on TinyMet☆28Updated 9 years ago
- Format string exploit generation☆10Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Updated 9 years ago
- It checks how secure the program you made is and shows how vulnerable your program is.☆20Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 11 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago
- Main repository to pull all Cisco related projects.☆16Updated 8 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 6 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Updated 12 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- Virtual host brute forcer☆22Updated 12 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 12 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 12 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago
- A fuzzing script for MitmProxy☆24Updated 10 years ago