tgg / connect-or-cutLinks
Simple network sandbox for Unix and Windows
☆20Updated 6 years ago
Alternatives and similar repositories for connect-or-cut
Users that are interested in connect-or-cut are comparing it to the libraries listed below
Sorting:
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆81Updated 6 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- RFC8484 and DoH/JSON resolver☆42Updated 2 years ago
- Linux Application Firewall☆58Updated 5 years ago
- ☆25Updated 10 years ago
- ☆30Updated 10 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- lots of performance (or lots of porn, if you prefer) httpd: Easy, chrooted, fast and simple to use HTTP server for static content. Runs …☆145Updated 6 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Safe cryptographic steganographic advanced filesystem☆13Updated 2 years ago
- ☆86Updated 8 years ago
- A library for efficient interception of established TCP connections☆20Updated 10 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆310Updated 12 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Updated 10 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Updated 3 years ago
- experimental and very fast implementation of a grep☆265Updated 2 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 3 years ago
- Library and tools to access the Extended File System☆19Updated this week
- PoC to append and extract data at the end of an ELF file☆20Updated 8 years ago
- python tor client☆27Updated 10 years ago
- Statically linked Library detector☆70Updated 10 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆30Updated 6 years ago
- opmsg p2p transport network☆75Updated 7 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 11 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago