Covert Communication Network
☆19Mar 22, 2017Updated 8 years ago
Alternatives and similar repositories for Covert-TCP-IP-Protocol
Users that are interested in Covert-TCP-IP-Protocol are comparing it to the libraries listed below
Sorting:
- A Burp Suite extension to add a custom header (e.g. JWT)☆19Dec 3, 2020Updated 5 years ago
- This project reads data from a csv(MS Excel) file containing numeric data and then stores it into a 2D array in C++;☆10Mar 13, 2017Updated 8 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- The official Bento distribution - orchestration and deployment infrastructure for the Bento platform.☆10Feb 24, 2026Updated last week
- ☆15Dec 3, 2020Updated 5 years ago
- CTF writeups☆16Nov 20, 2025Updated 3 months ago
- buffer overflow skeleton scripts, can be used for any TCP based socket flows.☆10Oct 14, 2020Updated 5 years ago
- digital synthesizer made w/ C++☆10Dec 1, 2018Updated 7 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Password obfuscator for vpnc config files (beware that passwords can be deobfuscated using cisco-decrypt!!!)☆10Mar 19, 2020Updated 5 years ago
- This is most of the source to the BitBlinder project. The goal was to allow people to communicate or share information in any form onlin…☆15Nov 22, 2011Updated 14 years ago
- router firmwares, reverse engineering code snippets, mitm tools☆14Mar 20, 2020Updated 5 years ago
- All Base libraries decryption tool☆14Jan 2, 2022Updated 4 years ago
- Testing tools for Oracle Forms☆13Oct 23, 2025Updated 4 months ago
- The Ethereum Improvement Proposal repository☆14Apr 16, 2019Updated 6 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- notes Pd external object library for encoding music notation in lilypond syntax☆13Aug 19, 2022Updated 3 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- Port Swigger Labs divided on the based of level and topic.☆14Mar 15, 2022Updated 3 years ago
- This repository is for mobile app penetration testing checklist☆14Dec 7, 2021Updated 4 years ago
- ☆13Oct 31, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆16Sep 9, 2022Updated 3 years ago
- Nessus Vulnerability Scanner in a Docker container☆10Sep 25, 2018Updated 7 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Sep 13, 2021Updated 4 years ago
- Code snippets and demo example for other projects☆14Apr 23, 2021Updated 4 years ago
- AI chatbot for Telegram based on GPT4all☆16Nov 7, 2023Updated 2 years ago
- Xamarin sample application that demonstrates certificate public key pinning.☆13Aug 22, 2018Updated 7 years ago
- Pure C Data Structure and Utils☆20Feb 2, 2011Updated 15 years ago
- NetBIOS Name Service spoofing tool☆14Feb 7, 2014Updated 12 years ago
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago
- Bash Shell Script Cryptography☆13Jan 2, 2022Updated 4 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- Automatic SQL injector web-forum based CMS☆14Jan 2, 2022Updated 4 years ago
- Telegram bot to interact with ollama models☆18Mar 30, 2025Updated 11 months ago
- All-languages fork bombs☆14Jan 2, 2022Updated 4 years ago
- IndoXploit Webshell V.3☆14Oct 31, 2019Updated 6 years ago
- This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse pr…☆14Feb 20, 2023Updated 3 years ago