heikipikker Goto Github PK
Type: User
Type: User
This script has been developed to fulfill a practical work of the subject Network Security I, part of the UBA's Information Security career. It is for academic purposes.
cloudLab based covert channels implemented using C and Bash
Covert Communication between server and client using TCP channel.
Implementation of covert communication channel using disk reads through direct load generation and SSH load
userland code for creating a covert channel in wireless broadcast medium
Encode any secret message into HTML file
Implementation of a covert channel using the TCP destination port field
Covert channel program written in Python
copy my shit if you want to
A proof of concept covert channel application using the TCP/IP protocol suite.
Cowrie SSH/Telnet Honeypot
Tool for exploit CVE-2015-3306
Know the dangers of credential reuse attacks.
Queue and resource system for cracking passwords
A swiss army knife for pentesting networks
A swiss army knife for pentesting Windows/Active Directory environments
crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX
this program scraps apkpure.com website and downloads all the apks present in the website
A fast and stealthy credential harvester
A code demonstrating CVE-2018-0886
A simple Python tool to harvest email addresses from Google.
CRITs Services Collection
Windows Crypter
This is a advanced ransomware example made in AutoIt
After attackers manage to gain access to a remote (or local) machine and elevate their privileges to "root", they typically want to maintain their access, while hiding their presence from the normal users and administrators of the system. This basic rootkit works on the Linux operating system and is a loadable kernel module which when loaded into the kernel (by the attacker with root privileges) will do the following: 1) Hide specific files and directories from showing up when a user does "ls" and similar commands 2) Modify the /etc/passwd and /etc/shadow file to add a backdoor account while returning the original contents of the files (pre-attack) when a normal user requests to see the file 3) Hides processes from the process table when a user does a "ps" 4) Give the ability to a malicious process to elevate its uid to 0 (root) upon demand
An OSINT tool that discovers sub-domains by searching Certificate Transparency logs
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.