Skip to content
View ev0x's full-sized avatar

Organizations

@WFCD

Block or report ev0x

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
80 stars written in C
Clear filter

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

C 25,464 3,202 Updated Jun 5, 2025

Espressif IoT Development Framework. Official development framework for Espressif SoCs.

C 17,655 8,171 Updated Mar 27, 2026

Affordable WiFi hacking platform for testing and learning

C 14,695 2,761 Updated Aug 14, 2024

Small and highly portable detection tests based on MITRE's ATT&CK.

C 11,743 3,082 Updated Mar 26, 2026

windows-kernel-exploits Windows平台提权漏洞集合

C 8,626 2,862 Updated Jun 11, 2021

Direct Memory Access (DMA) Attack Software

C 7,521 985 Updated Feb 14, 2026

Defeating Windows User Account Control

C 7,457 1,420 Updated Feb 17, 2026

The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!

C 6,405 1,265 Updated Mar 27, 2026

Iceman Fork - Proxmark3

C 5,381 1,291 Updated Mar 27, 2026

Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)

C 5,038 396 Updated Mar 15, 2026

Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

C 4,515 736 Updated Jul 8, 2025

MemProcFS

C 4,063 513 Updated Mar 25, 2026

Simple (relatively) things allowing you to dig a bit deeper than usual.

C 3,491 558 Updated Feb 16, 2026

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

C 3,260 824 Updated Sep 3, 2022

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

C 2,476 341 Updated Sep 22, 2024

Kernel Driver Utility

C 2,468 510 Updated Mar 27, 2026

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

C 2,203 296 Updated Aug 15, 2024

A post exploitation framework designed to operate covertly on heavily monitored environments

C 2,169 334 Updated Sep 29, 2021

The swiss army knife of LSASS dumping

C 2,083 263 Updated Sep 17, 2024

ATTiny usb bootloader with a strong emphasis on bootloader compactness.

C 1,750 384 Updated Feb 6, 2026

LSASS memory dumper using direct system calls and API unhooking.

C 1,580 252 Updated Jan 5, 2021

Post Exploitation Collection

C 1,572 359 Updated May 1, 2020

Windows Privilege Escalation from User to Domain Admin.

C 1,453 224 Updated Dec 18, 2022

A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

C 1,404 270 Updated Nov 22, 2023

Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4

C 1,401 300 Updated May 5, 2021

LoadLibrary for offensive operations

C 1,178 209 Updated Oct 22, 2021

Remote operations commands implemented using Beacon Object Files

C 1,146 174 Updated Mar 5, 2026
Next