tgg / connect-or-cutLinks
Simple network sandbox for Unix and Windows
☆20Updated 6 years ago
Alternatives and similar repositories for connect-or-cut
Users that are interested in connect-or-cut are comparing it to the libraries listed below
Sorting:
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- RFC8484 and DoH/JSON resolver☆42Updated 2 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆10Updated 10 years ago
- Linux Application Firewall☆58Updated 5 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago
- experimental and very fast implementation of a grep☆262Updated 2 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆79Updated 5 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- A framework for analyzing/testing/fuzzing network applications.☆46Updated 6 years ago
- ☆30Updated 10 years ago
- An encryption tool for creating file archives☆26Updated last month
- Hashing tool supporting md5,sha1,sha256,sha512,whirlpool,jh and hmac versions of these. Includes recursive file hashing and other feature…☆65Updated last month
- Safe cryptographic steganographic advanced filesystem☆13Updated last year
- strings for a Linux process' address space☆51Updated 12 years ago
- Command-line privilege elevation for Windows☆23Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Alternative hexdump.☆15Updated 9 years ago
- Statically linked Library detector☆70Updated 10 years ago
- FireEgl's PuTTY - FuTTY!☆18Updated 9 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally writte…☆28Updated 12 years ago
- ☆24Updated 10 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- HTTP framework☆48Updated 8 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 11 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆17Updated 7 months ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Updated 3 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 8 years ago