Giter VIP home page Giter VIP logo

heikipikker's Projects

covert-channel-5 icon covert-channel-5

This script has been developed to fulfill a practical work of the subject Network Security I, part of the UBA's Information Security career. It is for academic purposes.

covert_channel icon covert_channel

Implementation of covert communication channel using disk reads through direct load generation and SSH load

covert_channel-2 icon covert_channel-2

userland code for creating a covert channel in wireless broadcast medium

covertchannel-2 icon covertchannel-2

A proof of concept covert channel application using the TCP/IP protocol suite.

cr3dov3r icon cr3dov3r

Know the dangers of credential reuse attacks.

cracklord icon cracklord

Queue and resource system for cracking passwords

crackmapexec-1 icon crackmapexec-1

A swiss army knife for pentesting Windows/Active Directory environments

crash icon crash

crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX

crawler icon crawler

this program scraps apkpure.com website and downloads all the apks present in the website

creepycrawler icon creepycrawler

A simple Python tool to harvest email addresses from Google.

cse509-rootkit icon cse509-rootkit

After attackers manage to gain access to a remote (or local) machine and elevate their privileges to "root", they typically want to maintain their access, while hiding their presence from the normal users and administrators of the system. This basic rootkit works on the Linux operating system and is a loadable kernel module which when loaded into the kernel (by the attacker with root privileges) will do the following: 1) Hide specific files and directories from showing up when a user does "ls" and similar commands 2) Modify the /etc/passwd and /etc/shadow file to add a backdoor account while returning the original contents of the files (pre-attack) when a normal user requests to see the file 3) Hides processes from the process table when a user does a "ps" 4) Give the ability to a malicious process to elevate its uid to 0 (root) upon demand

ct-exposer icon ct-exposer

An OSINT tool that discovers sub-domains by searching Certificate Transparency logs

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.