4nuit / HackingLinks
Just a few more hacking notes, techniques and tools
☆21Updated this week
Alternatives and similar repositories for Hacking
Users that are interested in Hacking are comparing it to the libraries listed below
Sorting:
- A list of useful tools for Malware Analysis (will be updated regularly)☆143Updated last month
- Latest CVEs with their Proof of Concept exploits.☆296Updated this week
- A comprehensive Hypervisor resources repo☆121Updated this week
- Useful scripts from past CTF challenges☆39Updated this week
- Pure Malware Development Resource Collections☆373Updated 8 months ago
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆77Updated this week
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆48Updated 2 years ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆144Updated last year
- ☆95Updated 6 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆404Updated 4 months ago
- PasteBomb C2-less RAT☆318Updated 10 months ago
- Application Fuzzing: Tools, Techniques, and Best Practices☆166Updated last year
- Embed a payload inside a PNG file☆348Updated 11 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆305Updated last year
- Official writeups for University CTF 2023: Brains & Bytes☆104Updated 9 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆187Updated 6 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆198Updated 2 months ago
- ☆218Updated 5 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 9 months ago
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆206Updated 9 months ago
- ☆49Updated 11 months ago
- This repository contains a few leaked files of HookBot.☆104Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 7 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆379Updated last week
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆57Updated 2 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆626Updated this week
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆30Updated 3 months ago
- ☆136Updated last week
- ⚠️ malware development☆610Updated last year