4nuit / HackingLinks
Just a few more hacking notes, techniques and tools
☆25Updated this week
Alternatives and similar repositories for Hacking
Users that are interested in Hacking are comparing it to the libraries listed below
Sorting:
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆129Updated 3 months ago
- Embed a payload inside a PNG file☆356Updated last year
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆56Updated 2 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆147Updated 3 months ago
- ☆161Updated 8 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆315Updated last year
- Pure Malware Development Resource Collections☆387Updated 10 months ago
- PasteBomb C2-less RAT☆318Updated 3 weeks ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆206Updated last week
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆412Updated 5 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆437Updated 2 months ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆157Updated last year
- Polymorphic Command & Control☆98Updated 8 months ago
- A reverse shell for Windows and Linux written in C.☆78Updated 3 years ago
- Collection of codes focused on Linux rootkits☆183Updated 2 weeks ago
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆93Updated last week
- ☆54Updated last year
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆391Updated last month
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆202Updated 3 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆648Updated last month
- POC exploit for CVE-2024-49138☆261Updated 8 months ago
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆86Updated last week
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- This repository contains a few leaked files of HookBot.☆106Updated 2 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆104Updated 5 months ago
- Latest CVEs with their Proof of Concept exploits.☆749Updated last week
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆49Updated 2 years ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆806Updated 7 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆61Updated 2 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆86Updated 2 months ago