Jamaledine AMARIR jamarir
-
[-] DsGetDcNameA Failed With Error: 0x6F
- 0uT 0F m4P
- @jamarir.bsky.social
- https://fr.linkedin.com/in/jamaledine-amarir-1bb686172
- https://app.hackthebox.com/profile/276075
- https://www.root-me.org/jamarir
Lists (14)
Sort Name ascending (A-Z)
Stars
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
A little tool to play with Windows security
Flipper Zero Unleashed Firmware
Playground (and dump) of stuff I make or modify for the Flipper Zero
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals…
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
Nmap - the Network Mapper. Github mirror of official SVN repository.
windows-kernel-exploits Windows平台提权漏洞集合
A curated list of Multiplayer Game Network Programming Resources
RogueMaster Flipper Zero Firmware
The Minimalistic x86/x64 API Hooking Library for Windows
linux-kernel-exploits Linux平台提权漏洞集合
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…
Windows Internals Book 7th edition Tools
Abusing impersonation privileges through the "Printer Bug"
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
[Linux] Two Privilege Escalation techniques abusing sudo token
Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bookmarks from modern Chromium-based and Gecko-based browsers …
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to …
Software-based TOTP/HOTP authenticator for Flipper Zero device.