☆10Feb 14, 2017Updated 9 years ago
Alternatives and similar repositories for zentables-addons
Users that are interested in zentables-addons are comparing it to the libraries listed below
Sorting:
- Network testing tool and traffic generator☆14Jan 15, 2020Updated 6 years ago
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Jun 2, 2014Updated 11 years ago
- "Polymorphic" shellcode generator (x86)☆26Oct 28, 2014Updated 11 years ago
- PacketScript enables the scripting of Linux Netfilter extensions using the Lua scripting language.☆36Mar 20, 2011Updated 14 years ago
- http://sourceforge.net/projects/strace/☆25Feb 4, 2015Updated 11 years ago
- Join meetings from the menubar.☆10Feb 15, 2021Updated 5 years ago
- detects several virtualizations☆45Dec 29, 2015Updated 10 years ago
- My personal useful scripts☆14Nov 15, 2016Updated 9 years ago
- Load-balancing proxy for PostgreSQL read-replicas☆34Dec 17, 2025Updated 2 months ago
- Fast, efficient, private cloud store☆10Apr 6, 2017Updated 8 years ago
- An open-source redundant distributed storage network☆17Oct 3, 2014Updated 11 years ago
- SQS Job Kicker is the simple worker to invoke command from SQS message☆13Feb 20, 2024Updated 2 years ago
- Generate GSM authentication triplets (as per 3GPP TS 55.205)☆16Jan 11, 2018Updated 8 years ago
- Linux kernel programming using loadable kernel modules (LKMs)☆14Oct 25, 2018Updated 7 years ago
- A relatively simple, unified method for reporting on Kubernetes resource issues.☆12Mar 5, 2020Updated 6 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Real-time anomaly detection tool☆10Dec 6, 2017Updated 8 years ago
- ☆47Nov 30, 2025Updated 3 months ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Just an example I wrote for a tc ebpf classifier (cls_bpf)☆15May 3, 2021Updated 4 years ago
- Tr1d1um is the Webpa micro-service that encode TR-181 requests.☆16Updated this week
- Build your own complete XNU kernel header set, replaces Kernel.framework. Gain access to kernel private structures and symbols etc with I…☆13Jun 21, 2018Updated 7 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- Tail Mongo database logs☆11Aug 31, 2017Updated 8 years ago
- iOS app that syncs device's photos to an FTP NAS server☆10Nov 4, 2017Updated 8 years ago
- Examples of programs written in several languages☆11Apr 18, 2023Updated 2 years ago
- Find which process is connected to a given unix socket.☆40Nov 15, 2014Updated 11 years ago
- Lua data library☆38Sep 8, 2020Updated 5 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- i2p c++ implementation☆19Feb 21, 2015Updated 11 years ago
- Buildroot for BeagleBone☆12Oct 12, 2021Updated 4 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- A password manager to share TOTP with your team☆14Jan 7, 2021Updated 5 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- A lightweight web server that turns your localhost into an Event Grid Topic server.☆11Apr 11, 2018Updated 7 years ago