nixawk / hello-cLinks
c programming
☆10Updated 4 years ago
Alternatives and similar repositories for hello-c
Users that are interested in hello-c are comparing it to the libraries listed below
Sorting:
- Wi-Fi Backdoors☆39Updated 10 years ago
- ☆54Updated 8 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 9 months ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆20Updated 8 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆29Updated 9 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Updated 7 years ago
- Wordpress AFD dl-skin.php Exploit☆15Updated 8 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Updated 8 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆86Updated 11 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆43Updated 4 years ago
- Transplant adore rootkit for Android platform.☆37Updated 11 years ago
- This version touches disk for registry persistence.☆26Updated 9 years ago
- Security Advisories and Researches☆15Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- log file scrubber☆16Updated 7 years ago
- Anonymous FTP Scanner Script- Generates IP's between two ranges, scans 21 and attempts a anonymous connection☆10Updated 10 years ago
- CTF Writeups☆18Updated 8 years ago
- Black Nurse DOS attack☆72Updated 7 years ago
- Password cracking utility☆53Updated 4 years ago
- Hacking tools resources☆33Updated 11 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago