nachash / htp-zines
A collection of Hack The Planet's zines.
☆71Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for htp-zines
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Useful books, links, blogs, etc.☆14Updated 6 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- Copy of the contents at phrack.com☆35Updated 2 months ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆81Updated last year
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆56Updated 11 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆42Updated 5 years ago
- Wifi-Biter is a dictionary generator used to generate dictionaries/wordlist for Wireless Router Passwords.☆12Updated 6 years ago
- ☆16Updated 10 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆85Updated 6 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆36Updated 5 years ago
- ☆64Updated 8 years ago
- Generate very tiny reverse shell binaries for Linux~☆74Updated 4 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Hacker OPSEC☆94Updated 6 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 9 years ago
- The SSH Multiplex Backdoor Tool☆62Updated 5 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- HORSEPILL rootkit PoC☆223Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆79Updated 5 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Files compiled from the Logica breach investigation materials☆40Updated 6 years ago
- Linux Runtime Process Injection Tool☆58Updated 11 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆52Updated 9 years ago
- Blogging about reversing "script kiddie" style malware.☆94Updated 9 years ago
- Twitter as an extra entropy source☆98Updated 6 years ago