Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
-
Updated
Sep 3, 2024 - C++
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
Penetration testing utility and antivirus assessment tool.
Windows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
Dump a process memory and extract data based on regular expressions.
A secure file-sharing application built with Qt6
Ethical Hacking tools
TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.
🕵️♂️Stealth Key Logger🔑
light weight revershell thats remote and it can be port forwarded to work over WAN very efficient BackDoor
A high-performance offensive security framework engineered in C++. Features a custom modular architecture for orchestrating network reconnaissance, Man-in-the-Middle (MITM) operations, and stress testing via raw socket manipulation.
ETHICAL-HACKING
⚡ Script Kiddie Ultra Pro MaxX (Legend Mode) 💻
Detector WiFi con ESP32 y pantalla táctil ILI9341: escanea redes, muestra señal en tiempo real y permite seleccionar y rastrear puntos de acceso.
This project simulates a Distributed Denial-of-Service (DDoS) attack in a virtual network environment. It models a network of nodes, some of which act as attackers flooding a target node with malicious traffic. The simulation supports various traffic mitigation strategies to analyze their effectiveness under attack conditions.
A lightweight tool for performing security checks on account protection, such as cloning users and adding users.
Ethical hacking monitor that records keyboard input into a text file.
C++ projects for Ethical Hacking / Networking
🛡️ Implement advanced EDR evasion techniques for Windows x64 systems with StyxLoaderX, featuring dynamic syscall mapping and AES-256 encryption.
Add a description, image, and links to the ethical-hacking topic page so that developers can more easily learn about it.
To associate your repository with the ethical-hacking topic, visit your repo's landing page and select "manage topics."