4nuit / HackingLinks
Just a few more hacking notes, techniques and tools
☆27Updated this week
Alternatives and similar repositories for Hacking
Users that are interested in Hacking are comparing it to the libraries listed below
Sorting:
- A list of useful tools for Malware Analysis (will be updated regularly)☆157Updated 5 months ago
- Embed a payload inside a PNG file☆364Updated last year
- ☆56Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆53Updated 2 years ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆171Updated 5 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆320Updated 2 years ago
- Polymorphic Command & Control☆101Updated 10 months ago
- A list of all Active Directory machines from HackTheBox☆198Updated last month
- A reverse shell for Windows and Linux written in C.☆84Updated 3 years ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- Latest CVEs with their Proof of Concept exploits.☆1,063Updated this week
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- ☆225Updated 9 months ago
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆445Updated 7 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆67Updated last year
- Collection of codes focused on Linux rootkits☆192Updated 2 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆427Updated 7 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆417Updated 3 weeks ago
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆57Updated 4 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆806Updated 9 months ago
- Useful scripts from past CTF challenges☆42Updated 3 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆213Updated 2 months ago
- Pure Malware Development Resource Collections☆415Updated last year
- ☆141Updated last month
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆62Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆665Updated 3 weeks ago
- CVE-2025-56383-Proof-of-Concept☆54Updated 3 months ago
- PasteBomb C2-less RAT☆319Updated 3 months ago
- This repository contains a few leaked files of HookBot.☆106Updated 2 years ago