Reverse SSH C2
☆35Sep 19, 2025Updated 6 months ago
Alternatives and similar repositories for rscc
Users that are interested in rscc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- List UEFI Configuration Tables☆14May 23, 2024Updated last year
- Log all keyboard and terminal input/output for any app 记录任意程序的键盘输入和终端输入输出☆23Sep 19, 2025Updated 6 months ago
- Intel 64/Windows low-level experiments☆63Aug 25, 2025Updated 6 months ago
- DMA Firmware☆16Jun 25, 2024Updated last year
- Репозиторий с заданиями Ку бка CTF России 2022☆17Nov 20, 2022Updated 3 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- Pure Go GOST Cryptographic Functions Library☆13Jan 17, 2025Updated last year
- ARL官方仓库备份项目+指纹添加工具:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信 息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。☆17May 13, 2024Updated last year
- A VMBR (Virtual-Machine Based Rootkit) which runs a guest OS and sends the attacker its data☆28Apr 27, 2024Updated last year
- Generate a reverse shell macro for Word documents.☆39May 28, 2022Updated 3 years ago
- ☆94Sep 3, 2020Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- Ask ChatGPT directly from the Chrome address bar (omnibox)☆10Mar 23, 2023Updated 3 years ago
- A dynamically loadable virtual-machine based rootkit designed for Linux Kernel v5.13.0 using AMD-V (SVM).☆36Oct 26, 2025Updated 4 months ago
- ☆12Aug 23, 2019Updated 6 years ago
- IUSB - Virtual Media Protocol☆15Aug 8, 2015Updated 10 years ago
- Proxy network traffic from specific Windows processes with WireGuard☆31Jul 24, 2023Updated 2 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- IDA plugin for UEFI firmware analysis and reverse engineering automation☆14May 14, 2022Updated 3 years ago
- Awesome list for High Performance Computing / Parallel Computing resources.☆12Sep 20, 2017Updated 8 years ago
- FUSE based AES-CBC encrypted filesystem and encryption tool☆11Nov 12, 2017Updated 8 years ago
- Website for Reticulum☆22Jan 17, 2026Updated 2 months ago
- Mac OS X (10.5+) kernel extension which parses a Linux LVM2 layout and exposes single-device contiguous volumes as partitions. License: L…☆30Nov 20, 2014Updated 11 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Benchmark suite for real-time behavior, including interrupt latency and context switching times☆15Oct 20, 2021Updated 4 years ago
- A minimal and portable JSON tokenizer for building highly effective and strict parsers (in C and C++)☆27Nov 3, 2021Updated 4 years ago
- Exfiltrate data from a compromised target using covert channels☆17Mar 20, 2021Updated 5 years ago
- ☆13Dec 20, 2022Updated 3 years ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆10Feb 19, 2024Updated 2 years ago
- bitrix_utf8☆11Jan 26, 2015Updated 11 years ago
- ☆11Jul 5, 2023Updated 2 years ago
- Linux kernel source tree with changes to support LVBS with Hyper-V☆20Sep 12, 2024Updated last year
- Mirror of PowerBroker Identity Services☆20Dec 28, 2016Updated 9 years ago
- Thunderclap QEMU-based network card emulation☆30Oct 3, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/idapython☆20Apr 14, 2015Updated 10 years ago
- About PIVOting☆13Dec 19, 2023Updated 2 years ago
- Signed URLs for small devices.☆67Nov 4, 2025Updated 4 months ago
- ☆13Jun 26, 2023Updated 2 years ago
- webrtc esp8266 websocket led control☆18Feb 6, 2019Updated 7 years ago