4nuit / HackingLinks
Just a few more hacking notes, techniques and tools
☆27Updated this week
Alternatives and similar repositories for Hacking
Users that are interested in Hacking are comparing it to the libraries listed below
Sorting:
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- A list of useful tools for Malware Analysis (will be updated regularly)☆157Updated 6 months ago
- PasteBomb C2-less RAT☆318Updated 3 months ago
- Collection of codes focused on Linux rootkits☆195Updated 3 months ago
- ☆97Updated 11 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆177Updated 5 months ago
- Embed a payload inside a PNG file☆368Updated last year
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆430Updated last month
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆318Updated this week
- PoC for CVE-2024-48990☆106Updated last year
- Latest CVEs with their Proof of Concept exploits.☆1,123Updated 2 weeks ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆215Updated 3 months ago
- Application Fuzzing: Tools, Techniques, and Best Practices☆175Updated last year
- Official writeups for University CTF 2023: Brains & Bytes☆105Updated last year
- A list of all Active Directory machines from HackTheBox☆212Updated last week
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated last year
- Useful scripts from past CTF challenges☆43Updated 4 months ago
- Polymorphic Command & Control☆102Updated 11 months ago
- Proof of concept & details for CVE-2025-21298☆194Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆85Updated last year
- Basic reverse shell in C using socket() with complete explanation☆69Updated 2 years ago
- ☆144Updated 2 months ago
- ☆57Updated last year
- Windows And Ways To Break It☆100Updated last week
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- InvisibleJS: A CLI tool to convert JavaScript into an invisible, executable payload using Zero-Width encoding.☆59Updated 2 weeks ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆62Updated last year
- ☆164Updated 11 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆811Updated 10 months ago