gynvael / random-stuff
Random tools, code snippets, etc. No guarantee that any of this stuff works.
☆44Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for random-stuff
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Updated last year
- ☆35Updated this week
- Generate very tiny reverse shell binaries for Linux~☆74Updated 4 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆29Updated 5 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- Base64 Mutator☆12Updated 3 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆22Updated 2 years ago
- Papers, presentations and documents from the team at Hacker House.☆49Updated 5 years ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆57Updated last month
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 2 weeks ago
- THC "R U There" network discovery tool☆26Updated 4 years ago
- Intro to Assembly Optimization stream repo☆25Updated 2 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆27Updated 5 years ago
- ☆50Updated 4 years ago
- Material from presentations done by GoSecure researchers☆33Updated last year
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated last month
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Stealthy data exfiltration via IPv6 covert channel☆99Updated 5 years ago
- ☆48Updated 7 months ago
- ☆26Updated last year
- The Dumb Network Fuzzer☆19Updated last year
- Anti-reverse Compilation☆32Updated 3 years ago
- Detect & filter duplicate hashcat rules☆41Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- Vulnerabilities, exploits, and PoCs☆34Updated 2 months ago
- A workshop on Packet Crafting using Scapy.☆151Updated 4 years ago
- ☆36Updated 3 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- SSD Challenges☆47Updated 2 years ago