brosck / SimpleASMKernel
γπ»γSimple kernel made in 16-bit assembly only
β15Updated 2 months ago
Alternatives and similar repositories for SimpleASMKernel:
Users that are interested in SimpleASMKernel are comparing it to the libraries listed below
- A simple script to automate systemd backdoorβ22Updated 2 years ago
- A simple C program to demonstrate a Buffer Overflow.β11Updated 3 years ago
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanningβ18Updated 3 months ago
- DNS over HTTPS targeted malware (only runs once)β96Updated last year
- Make an Linux Kernel rootkit visible again.β47Updated last month
- Quickly find all identities someone has used on their Github commitsβ15Updated 6 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.β67Updated 5 months ago
- Persistence techniques for windows.β19Updated last year
- π Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)β18Updated last year
- γπͺγPort forwarding tool to gain access to internal devicesβ12Updated 2 months ago
- γπͺγLinux Backdoor based on ICMP protocolβ59Updated 2 months ago
- Subdomain Recon Toolβ13Updated 2 years ago
- β46Updated 2 years ago
- β13Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchersβ26Updated 2 months ago
- A cyber security oriented interpreted programming language designed to make your experience with cyber security (offensive and defensive)β¦β17Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.β63Updated last year
- γπ§±γTest a list of payloads and see if you can bypass itβ55Updated 2 years ago
- This is a simple process injection made in C for Linux systemsβ26Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticalβ¦β26Updated last year
- CVE-2024-34102: Unauthenticated Magento XXEβ14Updated last month
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.β20Updated last year
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 2 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secuβ¦β26Updated last year
- Mass Exploit - CVE-2023-38388 < Unauthenticated < Arbitrary File Uploadβ20Updated last year
- A python script to check if URLs are allowed or disallowed by a robots.txt file.β21Updated last week
- A script to protect your king in KoTHβ15Updated 2 years ago
- Lena's scripts/code/resources for malware analysisβ25Updated 8 months ago
- Manipulating tokens for SeImpersonatePrivilege exploitation using Windows APIβ9Updated 11 months ago