17 Resources
C/C++ bruteforce-attacks Libraries
Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.
SysmonSimulator SysmonSimulator is an Open source Windows event simulation utility created in C language, that can be used to simulate most of the att
This is the source code for Mirai. The compilation method has been simplified a little and some modifications have been made.
Mirai BotNet to Tashiro(未来砲) Leaked Linux.Mirai Source Code for Research/IoT Development Purposes Uploaded for research purposes and so we can develop
Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts
Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts. It’s well loaded, therefore it can be used as keylogger (keystroke logging), phishing tool, information collector, social engineering tool, etc.
Thc-ipv6 - IPv6 attack toolkit
THC-IPV6-ATTACK-TOOLKIT (c) 2005-2022 [email protected] https://github.com/vanhauser-thc/thc-ipv6 Licensed under AGPLv3 (see LICENSE file) INTRODUCTION Th
Flood is a tool which expolits some the most popular DDoS attacks
FLOOD Flood is a DDoS(Destributed denail of service) tool which can exploit some of the most popular DoS/ DDoS attacks. Features flood v0.0.1 It Suppo
Bruteforce BitCoin Private keys WIF, Minikeys, Passphrases...
Fialka M-125 This is a modified version LostCoins Huge thanks kanhavishva and to all developers whose codes were used in Fialka M-125. Quick start Сon
Evasive shellcode loader for bypassing event-based injection detection (PoC)
DripLoader (PoC) Evasive shellcode loader for bypassing event-based injection detection, without necessarily suppressing event collection. The project
Multiple payloads for the digispark digistump AVR boards.
Multiple payloads for the digispark digistump AVR boards. Some are translated from RubberDucky and some are original..
An advanced loader for infecting devices.
loader - An advanced loader for infecting devices. loader is a minimal, advanced loader written in C that uses its built-in parser to parse data from
Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as "adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors".
COBALT STRIKE 4.4 Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as "adversary simulation software designed to exe
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
Overview OneShot-C - implementation of OneShot on C OneShot-С performs Pixie Dust attack without having to switch to monitor mode. Features Pixie Dust
T-HYDRA is a modified version of original thc-hydra for better use inside Termux .
T-HYDRA is a modified version of original thc-hydra for better use inside Termux . Earlier , hydra pakage had been with Termux repositories. Then afte
Evasive shellcode loader for bypassing event-based injection detection (PoC)
(cleaned up version here: https://github.com/xinbailu/DripLoader-Ops) DripLoader (PoC) Evasive shellcode loader for bypassing event-based injection de
Code Injection, Inject malicious payload via pagetables pml4.
PageTableInjection Code Injection, Inject malicious payload via pagetables pml4. Introduction This is just a proof-of-concept of the page table inject
汇总了目前可以找到的所有的进程注入的方式,完成了x86/x64下的测试
Process-Injection 目前网上进程注入的文章很多,但是代码质量参差不齐,很多还只有x86下的代码,同时对于进程注入的探讨大多停留在各种注入手法上,缺少系列的汇总性的研究文章,故想要在本项目中汇总所有可以接触到的进程注入的手法,自行研究复现总结成文章,同时会将调试好的可执行的代码贴出,完
Side-channel file transfer between independent VM executed on the same physical host
Inter-process or cross-VM data exchange via CPU load modulation What is this I made this PoC as a visual aid for an online discussion about M1RACLES -
Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"
Overview This repository contains the source code to reproduce the experiments of the paper: Lord of the Ring(s): Side Channel Attacks on the CPU On-C