Skip to content
View ihebski's full-sized avatar
🔥
drunk ! 🍻
🔥
drunk ! 🍻

Block or report ihebski

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

31 results for source starred repositories written in C
Clear filter

Linux kernel source tree

C 206,526 58,302 Updated Nov 7, 2025

The fastest path to AI-powered full stack observability, even for lean teams.

C 76,595 6,221 Updated Nov 7, 2025

Modern HTTP benchmarking tool

C 39,732 3,025 Updated Dec 30, 2023

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

C 25,041 3,177 Updated Jun 5, 2025

Small and highly portable detection tests based on MITRE's ATT&CK.

C 11,179 2,991 Updated Nov 6, 2025

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…

C 10,697 2,456 Updated Mar 17, 2024

A repository for learning various heap exploitation techniques.

C 8,172 1,229 Updated Oct 29, 2025

A Linux version of the ProcDump Sysinternals tool

C 3,054 325 Updated Oct 13, 2025

A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…

C 2,559 738 Updated Jun 22, 2020

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

C 2,392 334 Updated Sep 22, 2024

A post exploitation framework designed to operate covertly on heavily monitored environments

C 2,160 336 Updated Sep 29, 2021

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

C 2,111 295 Updated Aug 15, 2024

Simple reverse ICMP shell

C 1,609 418 Updated Apr 6, 2018

A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.

C 1,306 210 Updated Oct 27, 2023

A memory-based evasion technique which makes shellcode invisible from process start to end.

C 1,195 143 Updated Oct 16, 2023

Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.

C 858 110 Updated Jan 20, 2022

AV Evasion Tool For Red Team Ops

C 769 151 Updated Dec 8, 2021

A Pwn2Own exploit chain

C 755 116 Updated Nov 8, 2018

This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to …

C 672 80 Updated Jul 6, 2024

An in depth tutorial on how to do binary exploitation

C 452 59 Updated Jun 19, 2018

Dump various types of Windows credentials without injecting in any process.

C 430 144 Updated Jan 13, 2023

Tips, Tricks, and Suggestions for Running a CTF

C 395 60 Updated Aug 2, 2022

CVE-2023-32233: Linux内核中的安全漏洞

C 371 79 Updated May 16, 2023

Some demos to bypass EDRs or AVs by 78itsT3@m

C 358 59 Updated Jul 6, 2022

A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.

C 323 43 Updated Jan 31, 2023

Exploit to SYSTEM for CVE-2021-21551

C 236 43 Updated May 20, 2021

Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process

C 105 22 Updated Mar 8, 2023
Next