Skip to content
View ahhh's full-sized avatar
👾
danger code
👾
danger code

Highlights

  • Pro

Organizations

@Binject

Block or report ahhh

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
115 stars written in C
Clear filter

The fastest path to AI-powered full stack observability, even for lean teams.

C 78,496 6,415 Updated Apr 18, 2026

World's fastest and most advanced password recovery utility

C 25,799 3,409 Updated Feb 20, 2026

BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more

C 22,353 4,044 Updated Apr 12, 2026

A little tool to play with Windows security

C 21,427 4,082 Updated Apr 17, 2026

build-once run-anywhere c library

C 20,757 735 Updated Mar 6, 2026

🍯 T-Pot - The All In One Multi Honeypot Platform 🐝

C 9,068 1,342 Updated Mar 14, 2026

SSH tarpit that slowly sends an endless banner

C 8,438 306 Updated Jun 3, 2024

A command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.

C 7,776 306 Updated Dec 13, 2025

Direct Memory Access (DMA) Attack Software

C 7,568 991 Updated Apr 15, 2026

Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

C 4,546 739 Updated Jul 8, 2025

Keepalived

C 4,540 765 Updated Nov 3, 2025

Porting Windows Dynamic Link Libraries to Linux

C 4,478 393 Updated Apr 10, 2025

A tool to dump the login password from the current linux user

C 4,093 648 Updated Sep 5, 2025

The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd party involvement. Pwnat is a newly developed technique, ex…

C 3,886 510 Updated Dec 26, 2025

Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do

C 3,880 492 Updated Jun 21, 2024

Transparently tunnel your IP traffic through ICMP echo and reply packets.

C 3,249 351 Updated Apr 12, 2022

generate CobaltStrike's cross-platform payload

C 2,555 375 Updated Nov 20, 2023

GodMode9 Explorer - A full access file browser for the Nintendo 3DS console :godmode:

C 2,508 220 Updated Apr 15, 2026

A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.

C 2,480 203 Updated Apr 2, 2026

LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)

C 2,296 482 Updated Mar 10, 2026

Shell script compiler

C 2,227 369 Updated Aug 19, 2024

Advanced CPU-based password recovery utility

C 2,220 299 Updated Sep 30, 2022

Go bindings for creating BPF programs.

C 2,188 308 Updated Aug 31, 2023

A post exploitation framework designed to operate covertly on heavily monitored environments

C 2,172 332 Updated Sep 29, 2021

Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.

C 2,129 461 Updated Apr 6, 2026

🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc

C 2,011 505 Updated Jul 13, 2022

LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquir…

C 1,971 368 Updated Apr 5, 2026

Windows Event Log Killer

C 1,813 306 Updated Sep 21, 2023

Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.

C 1,661 183 Updated Oct 19, 2023

LSASS memory dumper using direct system calls and API unhooking.

C 1,582 252 Updated Jan 5, 2021
Next