Skip to content
View chandanchowdhury's full-sized avatar
💭
Catching up
💭
Catching up

Highlights

  • Pro
Block or Report

Block or report chandanchowdhury

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
53 stars written in C
Clear filter

Zstandard - Fast real-time compression algorithm

C 22,768 2,033 Updated Jul 4, 2024

Nmap - the Network Mapper. Github mirror of official SVN repository.

C 9,583 2,331 Updated Jul 4, 2024

Small and highly portable detection tests based on MITRE's ATT&CK.

C 9,340 2,723 Updated Jul 6, 2024

A repository for learning various heap exploitation techniques.

C 7,021 1,126 Updated Jun 5, 2024

Program to decode radio transmissions from devices on the ISM bands (and other frequencies)

C 5,910 1,295 Updated Jun 28, 2024

An implementation of the TLS/SSL protocols

C 4,462 698 Updated Jul 6, 2024

OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.

C 4,330 1,024 Updated Jun 6, 2024

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.

C 4,256 1,405 Updated Jul 5, 2024

Wrangling Untrusted File Formats Safely

C 4,064 129 Updated May 27, 2024

Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)

C 3,010 512 Updated Mar 25, 2024

Official MINIX sources - Automatically replicated from gerrit.minix3.org

C 2,886 941 Updated Mar 18, 2024

The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digi…

C 2,520 593 Updated Jul 5, 2024

A dead simple tool to sign files and verify digital signatures.

C 2,002 115 Updated Jun 30, 2024

A network sniffer that logs all DNS server replies for use in a passive DNS setup

C 1,652 374 Updated May 28, 2024

Python interface to Bluetooth LE on Linux

C 1,581 490 Updated Jun 24, 2024

Post Exploitation Collection

C 1,549 360 Updated May 1, 2020

memory scanner for Linux

C 1,517 178 Updated May 21, 2024

LibTomCrypt is a fairly comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining …

C 1,511 449 Updated Jun 29, 2024

An offline Wi-Fi Protected Setup brute-force utility

C 1,504 309 Updated Apr 19, 2023

A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.

C 1,284 329 Updated Apr 1, 2024

A Swiss army knife for your daily Linux network plumbing.

C 1,195 237 Updated Feb 1, 2023

A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.

C 953 316 Updated Dec 13, 2017

A collection of vulnerable ARM binaries for practicing exploit development

C 886 168 Updated Nov 15, 2021

Instrument Cluster Simulator

C 761 210 Updated Feb 1, 2024

LibTomMath is a free open source portable number theoretic multiple-precision integer library written entirely in C.

C 639 196 Updated Jul 1, 2024

Simple DNS Rebinding Service

C 603 80 Updated Jan 16, 2020

Share Hash Tables With Stable Key Hints Stored In Memory Mapped Files Between Arbitrary Processes

C 459 71 Updated Dec 23, 2020

PRISM is an user space stealth reverse shell backdoor, written in pure C.

C 457 168 Updated Sep 28, 2016
Next