0xCD4 / Low-Level-Projects
just for fun
☆15Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for Low-Level-Projects
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆32Updated 3 months ago
- Web Penetration Testing Course Materials☆33Updated 6 months ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆19Updated 3 months ago
- ☆41Updated 4 months ago
- Online-Crawler-Wayback-Machine☆25Updated last month
- ⚠️ Malware Development training ⚠️☆29Updated 2 months ago
- Application Fuzzing: Tools, Techniques, and Best Practices☆153Updated last month
- فایل ها و فیل م های ورکشاپ ردتیم 2024 با هانت لرن☆26Updated 2 months ago
- In-Memory Rootkit For Linux☆64Updated 3 weeks ago
- Embed a payload inside a PNG file☆209Updated 3 weeks ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆108Updated 3 months ago
- Repo for all my exploits/PoCs☆27Updated 2 months ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆27Updated 10 months ago
- Chista | Open Threat Intelligence Framework☆53Updated 6 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆67Updated last month
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆28Updated 3 weeks ago
- Capture screenshots of onion services on an onion service.☆49Updated 5 months ago
- This tool live-monitors specified Telegram channels for messages that contain certain keywords and forwards them to a private channel.☆26Updated last month
- ☆37Updated 3 months ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆41Updated 11 months ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆18Updated 4 years ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆24Updated 2 months ago
- Pyload RCE with js2py sandbox escape☆14Updated 3 weeks ago
- ☆27Updated 4 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆25Updated last week
- Lena's scripts/code/resources for malware analysis☆25Updated 5 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 2 years ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆44Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆47Updated last month
- Powershell Scripts for Blue Team members☆12Updated 11 months ago