🛡️ Bypass DEP/NX protection on Windows x64 using hardware breakpoints and instruction emulation to execute code from non-executable memory.
-
Updated
Dec 19, 2025 - C
🛡️ Bypass DEP/NX protection on Windows x64 using hardware breakpoints and instruction emulation to execute code from non-executable memory.
🚀 Demonstrate code execution from non-executable memory on Windows x64 by bypassing DEP/NX protection using hardware breakpoints and instruction emulation.
🛠️ Discover exploits quickly with ExploitHawk, a terminal-based tool for ethical hacking across Linux distributions, offering fast, accurate search results.
Kernel-space x86_64 Linux rootkit leveraging kprobes and ftrace for syscall hooking (hiding entries and reverse shell backdoor)
ExploitHawk is a powerful terminal-based exploit search tool for ethical hacking and red team operations, designed for Linux distributions(Debian, Rhel, Arch)
Trojan (Ransomware) Phishing Simulator for Cybersecurity Training.
a small part of my studies
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Reverse shell in C language for linux with a basic level of persistency
Solutions to the popular library of binary exploitation CTFs made by exploit.education, Protostar
A lightweight packet analyzer tool featuring a user-friendly GUI interface using Npcap and wxWidgets.
An implementation of Verifiable Delay Functions in Java
STM32 Rubber Ducky (pentesting tool) bulit as a part of Embedded Systems course project at Amrita Vishwa Vidyapeetham
is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)
is a PoC exploit for the macOS vulnerability CVE-2023-40404. This PoC leverages IOKit APIs to interact with the IOUserEthernetResource network service, manipulating the system's network interfaces
is a PoC script designed to demonstrate a potential vulnerability within the UDF (Universal Disk Format) filesystem implementation on macOS systems
Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.
Dynamic encryption method ransomware
Reverse Shell simples escrita em linguagem C (Windows/Linux)
Add a description, image, and links to the ethical-hacking topic page so that developers can more easily learn about it.
To associate your repository with the ethical-hacking topic, visit your repo's landing page and select "manage topics."