wvu / ye-olde-bsdLinks
Docker environment for 4.3BSD on VAX.
☆19Updated 2 years ago
Alternatives and similar repositories for ye-olde-bsd
Users that are interested in ye-olde-bsd are comparing it to the libraries listed below
Sorting:
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 9 months ago
- IPMI stuff from DARPA work☆74Updated 2 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- upstream for seccheck☆15Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- detects several virtualizations☆44Updated 9 years ago
- Scan for LLTD-enabled hosts on your network☆24Updated 4 years ago
- Files compiled from the Logica breach investigation materials☆44Updated 6 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 11 years ago
- Utility to determine if ELF binary is built with debug sections☆9Updated 3 years ago
- A high scalable low to medium interactive SSH/TCP honeypot using Linux Namespaces, capabilities, seccomp, cgroups designed for OpenWrt an…☆30Updated 5 years ago
- ☆24Updated 10 years ago
- DNS packet generator☆46Updated 11 months ago
- ☆57Updated 11 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Updated 9 years ago
- ptrace poke command-line tool☆14Updated 5 years ago
- SSTP VPN client for Linux☆18Updated 4 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Updated 8 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- (Linux Kernel) Stack Monitoring Tool☆45Updated 3 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated last year
- ELF binary infector☆32Updated 14 years ago
- ☆32Updated 5 years ago
- Decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, can also remove IEEE 802.1Q (virtual lan) header. Works w…☆33Updated 6 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- Web of trust grapher☆38Updated last month