t94j0 / haskell-nmap
Nmap results are a semigroup
☆13Updated 3 years ago
Alternatives and similar repositories for haskell-nmap:
Users that are interested in haskell-nmap are comparing it to the libraries listed below
- A library for disassembling x86-64 binaries.☆39Updated 3 weeks ago
- Spartan is a powerful and versatile network scanning tool designed to help system administrators and security professionals identify vuln…☆14Updated last month
- subleq assembler / interpreter / rop chain☆5Updated 5 years ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 3 months ago
- ☆13Updated 4 years ago
- A library for binary analysis and rewriting☆47Updated last year
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated last year
- ☆17Updated 6 years ago
- Collection of Windows Driver Utils☆11Updated last year
- Driver Attack Platform for Linux☆18Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- Store and read traces in Protobuf☆20Updated last year
- Source files and writeups for UTCTF 2019☆14Updated 4 years ago
- Source code of https://blahcat.github.io☆13Updated 8 months ago
- Regular expression Search on the command-line☆16Updated this week
- URI manipulation facilities☆25Updated last month
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Updated 6 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆10Updated 10 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 4 years ago
- The elf-edit library provides a datatype suitable for reading and writing Elf files.☆36Updated 3 weeks ago
- Haskell support for the Win32 API☆99Updated 2 months ago
- module for certexfil☆15Updated 2 years ago
- ☆19Updated 10 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆43Updated 8 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Learning compilers, interpreters, code generation, virtual machines, assemblers, JITs, etc.☆57Updated 11 months ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 4 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago