Skip to content
View samyoyo's full-sized avatar

Block or report samyoyo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
102 stars written in C
Clear filter

The fastest path to AI-powered full stack observability, even for lean teams.

C 76,618 6,222 Updated Nov 10, 2025

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

C 25,044 3,178 Updated Jun 5, 2025

World's fastest and most advanced password recovery utility

C 24,686 3,294 Updated Nov 9, 2025

UNIX-like reverse engineering framework and command-line toolset

C 22,574 3,134 Updated Nov 10, 2025

A little tool to play with Windows security

C 20,966 3,991 Updated May 11, 2025

A modern, portable, easy to use crypto library.

C 13,134 1,831 Updated Nov 3, 2025

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…

C 10,699 2,455 Updated Mar 17, 2024

The pattern matching swiss knife

C 9,197 1,532 Updated Oct 30, 2025

A repository for learning various heap exploitation techniques.

C 8,185 1,229 Updated Oct 29, 2025

Windows File System Proxy - FUSE for Windows

C 7,978 561 Updated Aug 21, 2025

HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

C 2,857 570 Updated Feb 24, 2025

JWT brute force cracker written in C

C 2,507 270 Updated Jun 2, 2023

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

C 2,393 334 Updated Sep 22, 2024

LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquir…

C 1,891 359 Updated Nov 9, 2025

Windows Event Log Killer

C 1,802 306 Updated Sep 21, 2023

SSH man-in-the-middle tool

C 1,724 211 Updated Jul 2, 2021

An offline Wi-Fi Protected Setup brute-force utility

C 1,681 314 Updated Apr 19, 2023

Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU

C 1,677 249 Updated Feb 14, 2024

All of the code from Learn C The Hard Way, each project, plus the presentation slides used in the videos.

C 1,337 502 Updated Apr 9, 2024

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

C 1,301 278 Updated Jan 31, 2022

Meltdown Exploit PoC

C 948 269 Updated Feb 14, 2018

Pre-migration repository. New repository ➙

C 871 307 Updated Mar 10, 2018

peinjector - MITM PE file infector

C 608 118 Updated May 11, 2016

A tool to help you write binary exploits

C 605 106 Updated Feb 21, 2019
C 561 125 Updated Oct 10, 2023

Tallow - Transparent Tor for Windows

C 555 118 Updated Sep 11, 2021

Multi-link VPN (ADSL/SDSL/xDSL/Network aggregation / bonding)

C 554 136 Updated Aug 4, 2022

A command-line network packet crafting and injection utility

C 525 75 Updated Sep 29, 2023
Next