Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for c attacker
attacker
x
c
x
32 search results found
Hash_extender
⭐
862
Prism
⭐
295
PRISM is an user space stealth reverse shell backdoor, written in pure C.
Spectre Attack Sgx
⭐
203
Spectre attack against SGX enclave
Mysql Unsha1
⭐
174
Authenticate against a MySQL server without knowing the cleartext password
Shelljack
⭐
147
A keystroke / terminal logger for Linux.
Troubleshooter
⭐
87
setroubleshootd xSports
Logrotten
⭐
79
Tcpauth
⭐
78
Reverse Shell Access Kernel Module
⭐
38
This is a kernel module invoked reverse shell proof of concept.
Honeytrap
⭐
34
Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner
Dtls Fuzzer
⭐
29
Protocol state machine learner and fuzzer for DTLS servers and clients
Hexpand
⭐
23
Hash Length Extension Attack
Cse509 Rootkit
⭐
23
After attackers manage to gain access to a remote (or local) machine and elevate their privileges to "root", they typically want to maintain their access, while hiding their presence from the normal users and administrators of the system. This basic rootkit works on the Linux operating system and is a loadable kernel module which when loaded into the kernel (by the attacker with root privileges) will do the following: 1) Hide specific files and directories from showing up when a user does "ls"
Rose Exploit
⭐
20
Remote kernel exploit for ROSE amateur radio
Sshd Honeypot
⭐
19
Ospy_rat
⭐
19
Ospy is a penetration testing tool for macOS, include keylogger, live screen catcher, reveres shell and more. Developed in c
Dllreverseshell
⭐
18
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
Self Healing_freertos
⭐
17
A self-healing FreeRTOS based on ARM TrustZone
Payloadtester_lfi_rfi
⭐
14
LFI/RFI Payload Tests Project
Tmpusb
⭐
13
Self-erasable USB drive.
Ban2fail
⭐
13
Simple & efficient log file scanning and iptable filtering
Pythia
⭐
10
Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.
Lunadht
⭐
8
Your general purpose DHT
Scam
⭐
8
Side-Channel Attack Monitoring and Mitigation
Libhashsig
⭐
7
Hash based digital signatures using lazy Merkle forests and Lamport, Diffie, Winternitz, Merkle one time signatures
Pcapvpn
⭐
7
Layer 2 VPN using a tap device on one end and pcap on the other
Smartcontracts
⭐
7
This is a repository containing smart contracts based on Ethereum and Vntchain.
Xctf 2019 Final Tnj
⭐
7
Tom and Jerry is the best, no doubt.
Reverseshell
⭐
7
Attacker can use the scripts to gain reverse shell of a target's machine.
Cve 2019 0708 Exp Windows
⭐
6
CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹Sys
Detour
⭐
5
GitHub mirror of Jann Horn's Detour
Keystretch
⭐
5
My attempt at an efficient memory-hard key stretching algorithm based on scrypt
Ddns
⭐
5
Lightweight UDP-based dynamic DNS updater
Related Searches
C Kernel (12,842)
C Video Game (4,242)
C Driver (4,106)
Python C (4,069)
C Firmware (3,545)
C Arduino (3,118)
C Usb (2,589)
C Arm (2,566)
C Command Line (2,475)
C Algorithms (2,333)
1-32 of 32 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.