darkcode357 / thg-framework
☆8Updated last year
Related projects ⓘ
Alternatives and complementary repositories for thg-framework
- git clone all repositories and gists from a given GitHub username☆32Updated 3 years ago
- ☆12Updated 4 years ago
- Just another curl wrapper for webCrawling purposes☆9Updated 5 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 9 years ago
- A command line Swiss army knife for string and number conversions☆17Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆24Updated 4 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Updated 6 years ago
- laboratório sobre buffer overflows☆15Updated 7 years ago
- Fuzz servers and clients using pcaps or mitm based approaches☆9Updated 4 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Telegram bot, created to verify if your e-mail leaked☆27Updated 3 years ago
- Node.js PoC exploit code for CVE-2018-4407☆11Updated 6 years ago
- ☆13Updated 4 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 7 years ago
- Amarula Python Botnet☆9Updated 5 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆36Updated 7 months ago
- ☆17Updated 5 years ago
- Kernel heap read buffer overflow on macOS/iOS requiring root.☆10Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆21Updated 11 years ago
- This is a PoC for CVE-2019-12594, a vulnerability in DOSBox 0.74-2.☆12Updated 5 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- A Unix rootkit☆14Updated 4 years ago