tgg / connect-or-cutLinks
Simple network sandbox for Unix and Windows
☆20Updated 6 years ago
Alternatives and similar repositories for connect-or-cut
Users that are interested in connect-or-cut are comparing it to the libraries listed below
Sorting:
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago
- experimental and very fast implementation of a grep☆264Updated 2 years ago
- Linux Application Firewall☆58Updated 5 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆81Updated 6 years ago
- RFC8484 and DoH/JSON resolver☆42Updated 2 years ago
- A Camouflage Proxy for the Tor Anonymity System☆87Updated 10 years ago
- WaitList.dat Parser☆26Updated 7 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 9 years ago
- python tor client☆27Updated 10 years ago
- ☆25Updated 10 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 8 years ago
- ☆30Updated 10 years ago
- A Qt-based disassembly viewer based on radare2☆76Updated 7 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- ☆86Updated 8 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 10 years ago
- Fast TCP encryption☆214Updated 3 years ago
- Official implementation of the VirusTotal API in C programming language☆113Updated 2 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Updated last year
- A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally writte…☆28Updated 12 years ago
- Runtime Process Infection Made Easy☆187Updated last year
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- Command-line utility to control Tor.☆90Updated 2 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago