Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for c hacking tool
c
x
hacking-tool
x
29 search results found
Diamorphine
⭐
1,639
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Paradoxiarat
⭐
663
ParadoxiaRat : Native Windows Remote access Tool.
Pig
⭐
376
A Linux packet crafting tool.
Hypervisor Injector
⭐
203
Easy To Use Hyper-Visor Injector for Easy Anti Cheat, Battleye | supports amd + intel | Undetected + Active updates
Ice9 Bluetooth Sniffer
⭐
189
Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRP
Reveng_rtkit
⭐
181
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Octopuswaf
⭐
170
OctopusWAF is a WAF( Web application firewall) with high performance, made in C language and use libevent.
Eternalhushframework
⭐
167
EternalHush - new free advanced open-source c2 framework
Sudohulk
⭐
110
try privilege escalation changing sudo command
Sneakyexe
⭐
95
Embedding a "UAC-Bypassing" function into your custom payload
Smbusb
⭐
81
USB SMBus Interface
Uberducky
⭐
59
Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)
Esp32_hackingtool
⭐
43
Pb Af Xdp
⭐
40
An application that utilizes fast AF_XDP Linux sockets to send network packets. Used for penetration testing including Denial of Service (DoS), and network monitoring.
Bully
⭐
25
Brute force attack against WPS, that actually works
Tsuki Sploit
⭐
24
A USB-based script for Ethical hacking with multiple attacks
Wordlist Generator
⭐
24
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
Reverse Engineering
⭐
20
Reverse Engineering tools
Trj
⭐
19
Execute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Teensy3.2 Projects
⭐
16
Teensy 3.2 Projects - Teensy with CMD Command Execution Attack Example 💣
Malware With Backdoor And Keylogger
⭐
14
👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.
Oneshot C
⭐
12
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
Kook
⭐
12
A syscall hooking system for FreeBSD, NetBSD and also Linux.
K64cs Project
⭐
10
Hacking tools and notes for Kirby 64: The Crystal Shards.
Osintgram4j
⭐
10
A rebranded version of our old, beloved Osintgram Client
Scripts
⭐
9
Scripts for pentesting/hacking
Macgonuts
⭐
9
💻 🔌 📡 🔨 🔧 🔎 💣 ♠️ 👾 :trollface: :godmode: An ARP/NDP swiss army knife to make MAC going nuts on networks around!
Bully Vanilla
⭐
9
Vanilla version of Bully
Pcapvpn
⭐
7
Layer 2 VPN using a tap device on one end and pcap on the other
Ransomware
⭐
6
A ransomware written in C that works on linux (educational only)
J0lt Ddos Tool
⭐
5
DNS amplification tool. A type of DDoS attack in which attackers use publicly accessible open DNS servers to flood a target with DNS response traffic. An attacker sends a DNS lookup request to an open DNS server with the source address spoofed to be the target’s address. When the DNS server sends the record response, it is sent to the target instead.
Icloak
⭐
5
A DKOM hiding stuff for Linux, FreeBSD and NetBSD.
Related Searches
C Kernel (12,951)
C Video Game (4,242)
C Driver (4,106)
Python C (4,069)
C Firmware (3,545)
C Arduino (3,118)
C Usb (2,589)
C Arm (2,566)
C Command Line (2,475)
C Algorithms (2,333)
1-29 of 29 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.