Skip to content
View samyoyo's full-sized avatar

Block or report samyoyo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
44 results for source starred repositories written in C
Clear filter

The fastest path to AI-powered full stack observability, even for lean teams.

C 76,578 6,219 Updated Nov 6, 2025

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

C 25,035 3,176 Updated Jun 5, 2025

World's fastest and most advanced password recovery utility

C 24,661 3,290 Updated Oct 31, 2025

UNIX-like reverse engineering framework and command-line toolset

C 22,554 3,133 Updated Nov 6, 2025

A little tool to play with Windows security

C 20,955 3,987 Updated May 11, 2025

A modern, portable, easy to use crypto library.

C 13,115 1,829 Updated Nov 3, 2025

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…

C 10,691 2,454 Updated Mar 17, 2024

The pattern matching swiss knife

C 9,184 1,531 Updated Oct 30, 2025

A repository for learning various heap exploitation techniques.

C 8,171 1,229 Updated Oct 29, 2025

Windows File System Proxy - FUSE for Windows

C 7,962 560 Updated Aug 21, 2025

HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

C 2,852 570 Updated Feb 24, 2025

JWT brute force cracker written in C

C 2,507 270 Updated Jun 2, 2023

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

C 2,392 334 Updated Sep 22, 2024

LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquir…

C 1,889 357 Updated Aug 18, 2025

SSH man-in-the-middle tool

C 1,723 211 Updated Jul 2, 2021

An offline Wi-Fi Protected Setup brute-force utility

C 1,679 315 Updated Apr 19, 2023

All of the code from Learn C The Hard Way, each project, plus the presentation slides used in the videos.

C 1,336 502 Updated Apr 9, 2024

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

C 1,301 278 Updated Jan 31, 2022

Meltdown Exploit PoC

C 948 269 Updated Feb 14, 2018

peinjector - MITM PE file infector

C 608 118 Updated May 11, 2016

A tool to help you write binary exploits

C 605 106 Updated Feb 21, 2019
C 561 125 Updated Oct 10, 2023

Tallow - Transparent Tor for Windows

C 555 118 Updated Sep 11, 2021

Multi-link VPN (ADSL/SDSL/xDSL/Network aggregation / bonding)

C 554 136 Updated Aug 4, 2022

A command-line network packet crafting and injection utility

C 523 75 Updated Sep 29, 2023

BEURK Experimental Unix RootKit

C 384 97 Updated Apr 28, 2017

A Tool for Automatic Analysis of Malware Behavior

C 373 101 Updated May 8, 2019

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.

C 335 114 Updated Mar 6, 2019
Next