demon-i386 / cppngrok
a cpp wrapper for ngrok
☆9Updated 4 years ago
Alternatives and similar repositories for cppngrok
Users that are interested in cppngrok are comparing it to the libraries listed below
Sorting:
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 2 years ago
- A simple C program to demonstrate a Buffer Overflow.☆11Updated 3 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 2 years ago
- 🔨 Linux Hash Cracker☆31Updated 10 months ago
- ⭐ Physics class project☆34Updated 2 years ago
- ☆19Updated 4 months ago
- PE Injector - Inject code on 32-bit and 64-bit PE executables☆33Updated 3 years ago
- A simple script to automate systemd backdoor☆23Updated 2 years ago
- a simple assembly bootloader using nasm and Intel syntax☆10Updated 3 years ago
- This is a cpu tool for testing the floating-points peak performance. Now it supports linux and x86-64 platform. It can automatically reco…☆19Updated 4 years ago
- Open malware analysis / reversing database☆12Updated 3 years ago
- A simple multiplatform command line search tool for Windows API.☆46Updated 2 months ago
- Repositório do Curso de Ghidra☆19Updated 4 years ago
- CLI program to calculate the entropy of files☆71Updated last year
- Exploit development challenges!☆24Updated 2 years ago
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- AES-encrypted TCP/IP swiss army knife.☆10Updated 2 years ago
- Multiplatform CLI and GUI tool to show information about ELF files☆56Updated last year
- This is a simple process injection made in C for Linux systems☆26Updated last year
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated 9 months ago
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x☆128Updated last year
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Updated 3 years ago
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 3 years ago
- A simple tool that can save your life in an invasion. It consists of the junction of several modules (Commands/Loads) essential in an inv…☆12Updated 3 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 5 months ago
- Capture newly created files on Windows☆65Updated 3 years ago
- LD_PRELOAD rootkit☆5Updated 2 years ago
- Manipulating tokens for SeImpersonatePrivilege exploitation using Windows API☆8Updated last year
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆14Updated 2 months ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Updated last year