tgg / connect-or-cutLinks
Simple network sandbox for Unix and Windows
☆20Updated 6 years ago
Alternatives and similar repositories for connect-or-cut
Users that are interested in connect-or-cut are comparing it to the libraries listed below
Sorting:
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Updated 10 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆80Updated 5 years ago
- Linux Application Firewall☆58Updated 5 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆40Updated 11 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- ☆25Updated 10 years ago
- Alternative hexdump.☆15Updated 9 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 8 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 6 months ago
- A library for efficient interception of established TCP connections☆20Updated 10 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆310Updated 11 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 9 years ago
- ☆30Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- RFC8484 and DoH/JSON resolver☆42Updated 2 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 11 months ago
- Command-line privilege elevation for Windows☆23Updated 8 years ago
- python tor client☆27Updated 10 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- lots of performance (or lots of porn, if you prefer) httpd: Easy, chrooted, fast and simple to use HTTP server for static content. Runs …☆144Updated 6 years ago