dantsec / LinuxHashCracker
🔨 Linux Hash Cracker
☆32Updated 8 months ago
Alternatives and similar repositories for LinuxHashCracker:
Users that are interested in LinuxHashCracker are comparing it to the libraries listed below
- ☆20Updated 2 months ago
- ⭐ Physics class project☆35Updated 2 years ago
- A simple script to automate systemd backdoor☆23Updated 2 years ago
- a cpp wrapper for ngrok☆8Updated 3 years ago
- A simple C program to demonstrate a Buffer Overflow.☆11Updated 3 years ago
- This is a cpu tool for testing the floating-points peak performance. Now it supports linux and x86-64 platform. It can automatically reco…☆20Updated 4 years ago
- Burn Byte is a modern and powerful DDOS Toolkit☆38Updated 3 years ago
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 2 years ago
- a simple assembly bootloader using nasm and Intel syntax☆10Updated 3 years ago
- All next level week tracks☆11Updated 4 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated 7 months ago
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x☆128Updated last year
- Versão PT-BR do hacktricks.☆47Updated 4 months ago
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Updated 3 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆59Updated 3 months ago
- A simple tool that can save your life in an invasion. It consists of the junction of several modules (Commands/Loads) essential in an inv…☆12Updated 3 years ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- 😛 Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)☆18Updated last year
- FleakOS Kernel Source Tree☆29Updated 5 months ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆12Updated 2 years ago
- AES-encrypted TCP/IP swiss army knife.☆9Updated 2 years ago
- Open malware analysis / reversing database☆12Updated 3 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆102Updated last year
- Attacking the cleanup_module function of a kernel module☆25Updated this week
- Manipulating tokens for SeImpersonatePrivilege exploitation using Windows API☆9Updated last year
- A script to protect your king in KoTH☆15Updated 2 years ago
- rootkit for tryhackme king of the hill☆12Updated 11 months ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Updated last year
- A toolkit to control TTY devicesUpdated 2 years ago