tgg / connect-or-cutLinks
Simple network sandbox for Unix and Windows
☆20Updated 7 years ago
Alternatives and similar repositories for connect-or-cut
Users that are interested in connect-or-cut are comparing it to the libraries listed below
Sorting:
- Linux Application Firewall☆58Updated 5 years ago
- RFC8484 and DoH/JSON resolver☆42Updated 2 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- experimental and very fast implementation of a grep☆264Updated 2 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 8 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago
- ☆25Updated 10 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Updated last year
- Remote FUSE filesystem via server-side script☆65Updated 11 years ago
- Transparent HTTP/S Content Filter using Adblock Plus filters and CSS selectors for Windows Vista and later.☆62Updated 8 years ago
- ☆30Updated 10 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Updated 3 years ago
- Hybrid Port Knocking System☆22Updated 5 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Statically linked Library detector☆70Updated 11 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 9 years ago
- A library for efficient interception of established TCP connections☆20Updated 10 years ago
- Passive DHCP fingerprinting implementation☆52Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- A Qt-based disassembly viewer based on radare2☆76Updated 7 years ago
- Some yara rules and tools☆16Updated 11 years ago
- Quantum Insert/FoxAcid case study☆16Updated 8 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- python tor client☆27Updated 10 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- Semantic SSH RSA keys☆25Updated 11 years ago