Stars
The fastest path to AI-powered full stack observability, even for lean teams.
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
World's fastest and most advanced password recovery utility
UNIX-like reverse engineering framework and command-line toolset
A little tool to play with Windows security
A modern, portable, easy to use crypto library.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…
A repository for learning various heap exploitation techniques.
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquir…
An offline Wi-Fi Protected Setup brute-force utility
All of the code from Learn C The Hard Way, each project, plus the presentation slides used in the videos.
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
Multi-link VPN (ADSL/SDSL/xDSL/Network aggregation / bonding)
A command-line network packet crafting and injection utility
GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.