Code for my 0x00sec.org posts
☆330Sep 12, 2020Updated 5 years ago
Alternatives and similar repositories for 0x00sec_code
Users that are interested in 0x00sec_code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A ptrace POC by hooking SSH to reveal provided passwords☆188Apr 18, 2017Updated 8 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Jul 16, 2023Updated 2 years ago
- Linux based inter-process code injection without ptrace(2)☆258Aug 24, 2017Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Elf binary infector written in Go.☆215Jan 11, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆305Jan 12, 2023Updated 3 years ago
- AntiVirus Evasion Tool☆1,747Apr 23, 2025Updated 11 months ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 4 years ago
- A WebSocket C2 Tool☆415Nov 24, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Apr 15, 2019Updated 6 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆308Oct 27, 2017Updated 8 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- Demos of various injection techniques found in malware☆791Feb 15, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Search for code cave in all binaries☆284Oct 22, 2025Updated 5 months ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 8 years ago
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- Windows Vpn Scripter☆14Dec 7, 2016Updated 9 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆415Jan 2, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- Open-Source Shellcode & PE Packer☆2,080Feb 3, 2024Updated 2 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆996Feb 10, 2019Updated 7 years ago
- A memory scanning evasion technique☆899May 24, 2017Updated 8 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,420Jul 20, 2020Updated 5 years ago
- Windows Event Log Killer☆1,813Sep 21, 2023Updated 2 years ago