AES-encrypted TCP/IP swiss army knife.
☆11Nov 6, 2022Updated 3 years ago
Alternatives and similar repositories for snc
Users that are interested in snc are comparing it to the libraries listed below
Sorting:
- a simple assembly bootloader using nasm and Intel syntax☆10Mar 12, 2022Updated 3 years ago
- Botnet written in pure Go☆24Feb 10, 2024Updated 2 years ago
- Kernel module to hide tcp connections from an attacker ip address☆11Mar 24, 2022Updated 3 years ago
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆17Oct 13, 2022Updated 3 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- AMD SVM hypervisor rootkit proof of concept☆49Sep 23, 2023Updated 2 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆10Mar 18, 2019Updated 6 years ago
- PINTool to help analyzing malware that uses process injection☆16Jan 3, 2022Updated 4 years ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- 月之暗面 moonshot AI nodejs SDK typescript kimi☆12Apr 13, 2024Updated last year
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆13Feb 16, 2023Updated 3 years ago
- An ELF parser written fully in NASM.☆12Oct 20, 2025Updated 4 months ago
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 9 months ago
- A portable and efficient infrastracture for value profilers. Doc: https://vclinic.readthedocs.io/en/latest/index.html☆14Jan 22, 2026Updated last month
- Parse Suricata rules☆14Aug 1, 2023Updated 2 years ago
- Введение в разработку вредоносных программ☆11Oct 15, 2023Updated 2 years ago
- 🌐 A curated list of anonymous networks & research papers☆17Oct 15, 2024Updated last year
- Gevent 中文入门教程文档,翻译 from sdiehl/gevent-tutorial☆10May 21, 2020Updated 5 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- A simple tool that can save your life in an invasion. It consists of the junction of several modules (Commands/Loads) essential in an inv…☆13Feb 25, 2022Updated 4 years ago
- My first dotfiles ever. Made for wayfire☆11Nov 5, 2022Updated 3 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.☆15Sep 8, 2024Updated last year
- Use dnsdb.io on your terminal☆13Apr 18, 2018Updated 7 years ago
- ☆19Jan 11, 2025Updated last year
- experimental wildcard subdomain filtering prototype☆16Aug 5, 2023Updated 2 years ago
- a simple fetch☆11Jun 11, 2022Updated 3 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- ☆17Oct 9, 2024Updated last year
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated last year
- Patch ELF to unshc —— decrypt and extract script from shc(Shell script compiler)☆16Sep 17, 2025Updated 5 months ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- ☆15Jun 23, 2022Updated 3 years ago
- Obtain connected WiFi passwords☆20Mar 14, 2022Updated 3 years ago
- 5xDDoS is a DDoS tool with great attack power, be careful when using it☆53Oct 5, 2025Updated 5 months ago