4nuit / HackingLinks
Just a few more hacking notes, techniques and tools
☆21Updated 2 weeks ago
Alternatives and similar repositories for Hacking
Users that are interested in Hacking are comparing it to the libraries listed below
Sorting:
- Embed a payload inside a PNG file☆345Updated 10 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆304Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆137Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Updated 10 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆187Updated 5 months ago
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆77Updated this week
- Windows And Ways To Break It☆99Updated last year
- Polymorphic Command & Control☆89Updated 5 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆247Updated 11 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆143Updated 3 weeks ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆65Updated 10 months ago
- PasteBomb C2-less RAT☆321Updated 9 months ago
- ☆161Updated 6 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 8 months ago
- ☆131Updated 2 weeks ago
- A collection of config files for linux focusing on hackthebox theme☆51Updated 8 months ago
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆327Updated 3 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆138Updated 7 months ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆53Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆65Updated 11 months ago
- A reverse shell for Windows and Linux written in C.☆77Updated 3 years ago
- PoC for Broken Access Control vulnerability in WordPress Elementor Pro Plugin. This vulnerability has been fixed in version 3.11.7.☆11Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆75Updated 2 weeks ago
- Vulnerabilities you my miss during a penetration testing.☆99Updated last year
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- This repository contains a few leaked files of HookBot.☆105Updated 2 years ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆413Updated 3 weeks ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆402Updated 7 months ago
- Awesome Privilege Escalation☆121Updated 2 years ago