A lightweight packet analyzer tool featuring a user-friendly GUI interface using Npcap and wxWidgets.
-
Updated
Mar 31, 2025 - C
A lightweight packet analyzer tool featuring a user-friendly GUI interface using Npcap and wxWidgets.
is a PoC script designed to demonstrate a potential vulnerability within the UDF (Universal Disk Format) filesystem implementation on macOS systems
Reverse Shell simples escrita em linguagem C (Windows/Linux)
🚀 Demonstrate code execution from non-executable memory on Windows x64 by bypassing DEP/NX protection using hardware breakpoints and instruction emulation.
Solutions to the popular library of binary exploitation CTFs made by exploit.education, Protostar
Dynamic encryption method ransomware
🛡️ Bypass DEP/NX protection on Windows x64 using hardware breakpoints and instruction emulation to execute code from non-executable memory.
Reverse shell in C language for linux with a basic level of persistency
is a PoC exploit for the macOS vulnerability CVE-2023-40404. This PoC leverages IOKit APIs to interact with the IOUserEthernetResource network service, manipulating the system's network interfaces
is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)
An implementation of Verifiable Delay Functions in Java
SMB vulnerabilities have been around for 20+ years. In general, most cyber-attacks involving SMB do not occur because an enterprise failed to procure an expensive tool or application, but rather because there was a failure to implement best practices surrounding SMB.
a small part of my studies
🏴☠️ Tools for pen-testing, CTFs & wargames. 🏴☠️
STM32 Rubber Ducky (pentesting tool) bulit as a part of Embedded Systems course project at Amrita Vishwa Vidyapeetham
Our tool is able to gather dumps of all executable pages of packed processes.
ExploitHawk is a powerful terminal-based exploit search tool for ethical hacking and red team operations, designed for Linux distributions(Debian, Rhel, Arch)
🛠️ Discover exploits quickly with ExploitHawk, a terminal-based tool for ethical hacking across Linux distributions, offering fast, accurate search results.
Add a description, image, and links to the ethical-hacking topic page so that developers can more easily learn about it.
To associate your repository with the ethical-hacking topic, visit your repo's landing page and select "manage topics."