Hacking (〜 ̄▽ ̄)〜
Cybersecurity Professional in the making.
English | Spanish
- Jujuy, Argentina
Lists (18)
Sort Name ascending (A-Z)
📱 Android
8 repositories
⚔️ APT
1 repository
🔍 AV-Bypass
4 repositories
🔵 Blue Team
19 repositories
📝Code Analyzers
Static & dynamic analysis2 repositories
Core Programs
Really handy stuff I install on all computers4 repositories
🧷 Cracking
1 repository
💥 Denial of Service
1 repository
🍖 Exploitation
15 repositories
🚨 Forensics
3 repositories
🍯 Honey Pots
3 repositories
🔧 Miscelanous Tools
17 repositories
🧐 OSINT
6 repositories
🪝 Phising
2 repositories
🦴 Post-Exploitation
12 repositories
👁️ Recon
18 repositories
⚙️ Reverse Engineering
3 repositories
🔨 Software Development
3 repositories
Stars
2
results
for source starred repositories
written in Perl
Clear filter
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.