Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for c privileges
c
x
privileges
x
46 search results found
N2n
⭐
5,425
Peer-to-peer VPN
Mbox
⭐
597
A lightweight sandbox tool for non-root users
Procket
⭐
281
Erlang interface to low level socket operations
Printspoofer
⭐
246
Abusing Impersonation Privileges on Windows 10 and Server 2019
Fakechroot
⭐
177
gives a fake chroot environment
Systemtoken
⭐
156
Steal privileged token to obtain SYSTEM shell
Superuser
⭐
126
A simple and lightweight utility for starting any process with TrustedInstaller privileges.
Terminalmediaviewer
⭐
98
An utf-8/truecolor image and video viewer for the terminal
N2n_v2_fork
⭐
83
Logrotten
⭐
79
Waithax
⭐
65
An implementation of the waithax / slowhax 3DS Kernel11 exploit.
Spoolsystem
⭐
64
Print Spooler Named Pipe Impersonation for Cobalt Strike
Beamwhale
⭐
62
minimal container runtime in erlang
Kalu
⭐
57
Keep Arch Linux Up-to-date -- an upgrade notifier for Arch Linux
Slim
⭐
44
High-performance implementation of SLIM-based approaches for Top-N recommendation
Easysystem
⭐
38
Quick and dirty System (Power)Shell using NamedPipe impersonation.
Bric
⭐
35
bric is a text editor based on kilo.
Honeytrap
⭐
34
Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner
Msnake
⭐
34
a command line based snake game written in C using ncurses
Pseudo
⭐
32
A utility for emulating root privileges
Liinux
⭐
29
A linux rootkit works on kernel 4.0.X or higher
Energymon
⭐
29
A portable interface for energy monitoring utilities
Mysql Honeypotd
⭐
27
Low interaction MySQL honeypot written in C
Fakeroot
⭐
26
tool for simulating superuser privileges (OS X 10.4.x - 10.8.x compatible)
N2n
⭐
25
n2n: a Layer Two Peer-to-Peer VPN / this is not an official clone
Cse509 Rootkit
⭐
23
After attackers manage to gain access to a remote (or local) machine and elevate their privileges to "root", they typically want to maintain their access, while hiding their presence from the normal users and administrators of the system. This basic rootkit works on the Linux operating system and is a loadable kernel module which when loaded into the kernel (by the attacker with root privileges) will do the following: 1) Hide specific files and directories from showing up when a user does "ls"
Geany Json Prettifier
⭐
19
A JSON formatter prettifier, minifier and validator plugin for Geany editor
N2n_v3
⭐
17
n2n version 3.0
Buffer Overflows
⭐
14
An introduction to buffer overflow vulnerabilities exploitation.
Task_scheduler_alpc
⭐
13
PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability
Psyscall
⭐
12
Linux syscall() injection
Sepriv
⭐
12
Tool to manage user privileges
Mpp_sample
⭐
11
Allwinner V5 mpp sample code
Nimsm
⭐
11
Uses PxiFS0 to manage the nim savegame
Grayshell
⭐
10
Some basic shell code, when I learn <Gray Hat Hacking>
Ssh Honeypotd
⭐
10
A low-interaction SSH honeypot written in C
Proftpd Mod_vroot
⭐
9
ProFTPD module that creates "virtual" chroots
Riotdb
⭐
9
A package for statistical computing in R with efficient and transparent I/O
Slicd
⭐
9
simple lightweight Linux cron daemon
Dancy
⭐
7
Dancy Operating System
Hwfwbypass
⭐
7
Libenospace
⭐
5
Process-based disk usage limits
Oneway
⭐
5
a tool to drop privileges for docker entry-points
Run With Privileges On Osx
⭐
5
Tiny tool for running other programs with elevated privileges on Mac OS X.
Flashpolicyserv
⭐
5
A simple Flash socket policy server in C (event based, chroot and drop privileges)
Nuces Graph
⭐
5
C based Graph Theory Library
Related Searches
C Kernel (12,842)
C Video Game (4,242)
C Driver (4,106)
Python C (4,069)
C Firmware (3,545)
C Arduino (3,118)
C Usb (2,589)
C Arm (2,566)
C Command Line (2,475)
C Algorithms (2,333)
1-46 of 46 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.