hc0d3r / C
some codes
☆38Updated last year
Related projects: ⓘ
- ☆52Updated this week
- ☆15Updated this week
- ☆19Updated 9 years ago
- Força bruta em formulários web.☆19Updated 9 years ago
- ☆19Updated this week
- ☆19Updated this week
- Library for Dissect and Infect ELF Binaries.☆39Updated 9 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 9 years ago
- ☆52Updated 7 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 8 years ago
- Amarula Python Botnet☆9Updated 5 years ago
- ☆14Updated this week
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆21Updated 10 years ago
- ☆12Updated 7 years ago
- ☆51Updated this week
- a simple lib to help read and write in the memory of a linux process☆13Updated 5 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 13 years ago
- a linux process hacker tool☆83Updated 5 years ago
- A collection of shellcodes☆66Updated 12 years ago
- Send Attack Web Forms☆36Updated 2 years ago
- ☆91Updated this week
- all scripts created/mentioned in blog mh4x0f☆7Updated 6 years ago
- ☆10Updated this week
- SockStress DoS (Denial of Service) exploit written in Python |☆37Updated 9 years ago
- My old lectures material about C and ASM☆6Updated 7 years ago
- H2HC 2016 Slides/Materials/Presentations☆29Updated 7 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆48Updated 9 years ago
- A command line Swiss army knife for string and number conversions☆17Updated 4 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Updated 9 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Updated 5 years ago