tgg / connect-or-cut
Simple network sandbox for Unix and Windows
☆20Updated 6 years ago
Alternatives and similar repositories for connect-or-cut:
Users that are interested in connect-or-cut are comparing it to the libraries listed below
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- ☆30Updated 9 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- strings for a Linux process' address space☆51Updated 11 years ago
- Command-line privilege elevation for Windows☆23Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated 11 months ago
- A Toolkit to assist with the investigation of Sandboxing software☆50Updated 9 years ago
- ☆24Updated 9 years ago
- ☆17Updated 7 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 3 years ago
- Linux Application Firewall☆58Updated 4 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Several example uses of TPM2/TSS APIs.☆10Updated 9 years ago
- Safe cryptographic steganographic advanced filesystem☆13Updated last year
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Updated 3 months ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- Print core memory of a given a process ID (linux specific)☆11Updated 7 years ago
- Alternative hexdump.☆15Updated 9 years ago
- NetWatch System Management Mode VNC Server☆31Updated 15 years ago
- Some yara rules and tools☆16Updated 11 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 10 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- ☆35Updated 12 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆29Updated 8 years ago