4nuit / HackingLinks
Just a few more hacking notes, techniques and tools
☆20Updated last week
Alternatives and similar repositories for Hacking
Users that are interested in Hacking are comparing it to the libraries listed below
Sorting:
- Polymorphic Command & Control☆83Updated 3 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆139Updated 2 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 7 months ago
- Obfuscate the bytes of your payload with an association dictionary☆61Updated last week
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆378Updated 2 weeks ago
- ☆100Updated 3 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆56Updated 8 months ago
- A list of all Active Directory machines from HackTheBox☆60Updated this week
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 5 months ago
- ☆126Updated 2 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆283Updated last month
- C# AV/EDR Killer using less-known driver (BYOVD)☆175Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆168Updated 3 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆121Updated 4 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆130Updated 2 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year
- Lab used for workshop and CTF☆240Updated 2 weeks ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆81Updated last week
- Slides & Code snippets for a workshop held @ x33fcon 2024☆260Updated 11 months ago
- ☆103Updated 8 months ago
- Automate Maldoc creation☆22Updated last month
- My public notes about offensive security☆155Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆45Updated 2 months ago
- PDF dropper Red Team Scenairos☆208Updated 10 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆191Updated 3 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆82Updated 3 months ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆106Updated 2 weeks ago
- Proof of concept & details for CVE-2025-21298☆182Updated 4 months ago
- Analyse your malware to surgically obfuscate it☆469Updated last week
- EDR & Antivirus Bypass to Gain Shell Access☆239Updated 8 months ago