tillmannw / streams
☆18Updated 8 years ago
Alternatives and similar repositories for streams:
Users that are interested in streams are comparing it to the libraries listed below
- Yara Plugin for Binary Ninja☆13Updated 6 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 8 years ago
- ☆17Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆11Updated 8 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- A test framework for testing SSL/TLS client certificate validation.☆95Updated 3 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated 10 months ago
- Simple application for playing with elliptic curves☆43Updated 2 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- A simple ssh private key password recovery tool written in Go☆22Updated last year
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Does your library check TLS certificates properly?☆78Updated last year
- Repository to store unique seeds for DNS server fuzzing☆44Updated 8 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 5 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 8 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- A Genetic File, Syscall and Network Fuzzer.☆59Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago