Skip to content
View tnvo's full-sized avatar

Block or report tnvo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
46 stars written in C
Clear filter

The fastest path to AI-powered full stack observability, even for lean teams.

C 78,642 6,423 Updated Apr 29, 2026

World's fastest and most advanced password recovery utility

C 25,874 3,415 Updated Feb 20, 2026

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

C 25,570 3,202 Updated Apr 23, 2026

BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more

C 22,387 4,045 Updated Apr 26, 2026

A little tool to play with Windows security

C 21,472 4,093 Updated Apr 17, 2026

Small and highly portable detection tests based on MITRE's ATT&CK.

C 11,872 3,104 Updated Apr 29, 2026

The pattern matching swiss knife

C 9,581 1,559 Updated Feb 10, 2026

windows-kernel-exploits Windows平台提权漏洞集合

C 8,651 2,864 Updated Jun 11, 2021

A repository for learning various heap exploitation techniques.

C 8,614 1,265 Updated Apr 24, 2026

low cost software radio platform

C 7,784 1,679 Updated Apr 28, 2026

Direct Memory Access (DMA) Attack Software

C 7,600 997 Updated Apr 15, 2026

Arkime is an open source, large scale, full packet capturing, indexing, and database system.

C 7,361 1,140 Updated Apr 29, 2026

Course materials for Modern Binary Exploitation by RPISEC

C 5,967 907 Updated Dec 9, 2021

Generic command line non-JVM Apache Kafka producer and consumer

C 5,750 501 Updated Jul 9, 2024

linux-kernel-exploits Linux平台提权漏洞集合

C 5,596 1,732 Updated Jul 13, 2020

SL(1): Cure your bad habit of mistyping

C 3,261 457 Updated Jun 11, 2024

The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digi…

C 3,054 687 Updated Apr 27, 2026

A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…

C 2,732 761 Updated Jun 22, 2020

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

C 2,480 340 Updated Sep 22, 2024

Hardware backdoors in some x86 CPUs

C 2,394 221 Updated Oct 12, 2018

A post exploitation framework designed to operate covertly on heavily monitored environments

C 2,174 332 Updated Sep 29, 2021

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

C 2,094 359 Updated May 28, 2025

FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX

C 1,891 221 Updated Jan 8, 2026

Wiki-like CTF write-ups repository, maintained by the community. 2016

C 1,625 497 Updated Oct 2, 2018

Post Exploitation Collection

C 1,573 358 Updated May 1, 2020

A Swiss army knife for your daily Linux network plumbing.

C 1,402 256 Updated Jun 11, 2025

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

C 1,318 280 Updated Jan 31, 2022

This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.

C 1,287 119 Updated Oct 7, 2022

Snoopy Command Logger is a small library that logs all program executions on your Linux/BSD system.

C 1,285 162 Updated Mar 7, 2026
Next