Um projeto dedicado ao compartilhamento de artigos, links e documentos sobre Windows NT Internals, reunindo conhecimento avançado sobre o funcionamento do sistema para pesquisadores e entusiastas de low-level.
☆25May 16, 2025Updated last year
Alternatives and similar repositories for NtHadouken
Users that are interested in NtHadouken are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 「🧊」Ring 3 Rootkit for Windows 10☆63Dec 7, 2024Updated last year
- ☆12Feb 25, 2026Updated 2 months ago
- Multi-threading Leaks/Intelligence file parser☆15Updated this week
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Apr 30, 2023Updated 3 years ago
- ☆16Aug 29, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Bash-based recon automation script that orchestrates tools like Nmap, Dirsearch (Python), and crt.sh to perform port scanning, directory …☆15Jul 22, 2025Updated 9 months ago
- A collection of scripts to explore domains and pick up information.☆13Sep 17, 2018Updated 7 years ago
- Mobus write and read applications, standalone.☆10Jun 27, 2025Updated 10 months ago
- memory dump tool mirror for version 3.0.20171228.1☆18Oct 13, 2021Updated 4 years ago
- Colored Cat is a syntax highlighter file reader.☆15Jun 21, 2024Updated last year
- Misery Loader to bypass modern EDR solutions☆15Dec 20, 2024Updated last year
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆13Feb 16, 2023Updated 3 years ago
- POC for CVE-2025-54918 and a technical demonstration.☆58Jan 12, 2026Updated 4 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated last year
- ☆19Sep 17, 2025Updated 8 months ago
- A Binary Ninja plugin to help find the addresses and lengths of strings in Rust binaries.☆26Jan 11, 2026Updated 4 months ago
- A simple tool to interact with web shells and command injection vulnerabilities☆36Nov 26, 2024Updated last year
- ☆17Feb 17, 2022Updated 4 years ago
- ☆42Nov 15, 2025Updated 6 months ago
- An x86_64 Linux decompiler written in Python!☆14Jan 16, 2019Updated 7 years ago
- GiveWP PHP Object Injection exploit☆12Oct 1, 2024Updated last year
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Aug 16, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automate Pentest Tool☆35Sep 13, 2017Updated 8 years ago
- PoC for CVE-2024-42327 / ZBX-25623☆18Dec 3, 2024Updated last year
- ☆10Jun 29, 2021Updated 4 years ago
- Prototype Pollution Lab☆18Nov 20, 2020Updated 5 years ago
- Repository for doing pen300 exercises☆27Oct 21, 2022Updated 3 years ago
- Shaco is a linux agent for havoc☆169Oct 25, 2023Updated 2 years ago
- ☆26Apr 10, 2023Updated 3 years ago
- Roadmap completo para Cybersecurity.☆169Jun 2, 2024Updated last year
- exploit for CVE-2017-1000486 vulnerability with SOCKS proxy support☆19Apr 18, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- OWASP Foundation Web Respository☆15Dec 22, 2025Updated 4 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 3 years ago
- Deep Learning model monitoring☆24Jun 11, 2020Updated 5 years ago
- Malware to gain persistence on a victims machine.☆21Feb 12, 2023Updated 3 years ago
- Tweak Windows☆13Mar 26, 2025Updated last year
- Resources for CompTIA Security+ SY0-601 and related topics☆24Apr 27, 2024Updated 2 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆23Apr 14, 2014Updated 12 years ago