0xcpu / awesome-hackingLinks
A curated list of awesome Hacking tutorials, tools and resources
☆10Updated 2 years ago
Alternatives and similar repositories for awesome-hacking
Users that are interested in awesome-hacking are comparing it to the libraries listed below
Sorting:
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Samples about Microsoft RPC and native API calls in Windows C☆62Updated 8 years ago
- A simple shellcode runner☆20Updated 11 years ago
- The educational Animus malware☆18Updated 5 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Ambush Host Intrusion Prevention System☆65Updated 11 years ago
- Passive UAC elevation using dll infection☆74Updated 10 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 7 months ago
- Various Crypter Project☆52Updated 11 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- python inspect rootkit tool☆33Updated 11 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- ☆26Updated 8 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- ☆51Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- A script to reverse-engineer anti-virus signatures☆32Updated 12 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- Another dll injection tool.☆29Updated 10 years ago
- Dump Windows PE file information in C☆23Updated 10 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- ☆17Updated 6 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆43Updated 8 years ago
- A simple exploitable ActiveX control for RE/VR☆19Updated 11 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆15Updated 7 years ago