Copy of the contents at phrack.com
☆41Mar 18, 2025Updated 11 months ago
Alternatives and similar repositories for phrack
Users that are interested in phrack are comparing it to the libraries listed below
Sorting:
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- www.phrack.org☆79Jul 4, 2023Updated 2 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- ClickForClickOnce - Generate configurable clickonce payloads☆90Oct 10, 2025Updated 4 months ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆16Jan 19, 2020Updated 6 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Linux bootkit generator☆22Jan 10, 2015Updated 11 years ago
- HAXM hypervisor client☆18Nov 30, 2018Updated 7 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Asynchronous named pipe module for PowerShell☆21May 30, 2016Updated 9 years ago
- A tool for communicating with FingerTec access control devices, as well as other ZKTeco based devices☆21Jan 10, 2017Updated 9 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- TokenGet is a tool to intercept Samsung Pay tokens using a credit card reader and a raspberry zero.☆25Aug 15, 2016Updated 9 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- ☆23Mar 9, 2022Updated 3 years ago
- ☆22May 20, 2016Updated 9 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Feb 10, 2025Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- MemoryHacker is a tool which can search for values on the target process!☆22Jul 21, 2016Updated 9 years ago
- ☆49Dec 21, 2025Updated 2 months ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 3 years ago
- PhpSecInfo provides an equivalent to the phpinfo() function that reports security information about the PHP environment, and offers sugge…☆47Sep 11, 2011Updated 14 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- pwntools for go!☆22Feb 27, 2019Updated 7 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- WebShellManager build on cpp with libcurl☆24Dec 14, 2018Updated 7 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- MSIX Building Made Easy for Defenders☆59Aug 25, 2025Updated 6 months ago