willscott / sp3Links
(SP)^3: A Simple, Practical, and Safe Packet Spoofing Protocol
☆13Updated 8 years ago
Alternatives and similar repositories for sp3
Users that are interested in sp3 are comparing it to the libraries listed below
Sorting:
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- ☆20Updated last year
- CIDR to IP List Tool☆14Updated 9 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- CFURL Cache inspector for Burp Suite☆18Updated 4 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- Execute system calls over the network☆11Updated 10 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Updated 4 years ago
- python based backdoor software☆17Updated 13 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 12 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21Updated 8 years ago
- Hyper-V sockets☆29Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Mirror network traffic from one interface to another on Windows☆25Updated 5 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 8 years ago
- ☆21Updated 10 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 8 months ago