
-
127.0.0.1
- The internet
- https://replit.com/@antoniogit
- https://bandit-ita.github.io/
Stars
An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E01)
GNU Libc - Extremely old repo used for research purposes years ago. Please do not rely on this repo.
Breve corso Linux di introduzione alla shell e ai suoi comandi. By Roby7979
Chat with anyone around the world using your own server and client
An implementation of a loader of executable files using a demand paging mechanism
C Programming Language Example Code
This project aims to simulate object oriented programming in C,using structs and function pointers. Each .c,.cpp and .h files are uploaded, also their makefiles uploaded for compilers.
Sorting algorithms in multiple languages.
Historically first (actually 0.01) release of linux kernel made by Linus Torvalds
Una raccolta di risorse per l'insegnamento di Fisica (00405) del Corso di Laurea in Informatica.
Una raccolta di risorse per l'insegnamento di Linguaggi di programmazione (04138) del Corso di Laurea in Informatica.
Una raccolta di risorse per l'insegnamento di Fondamenti di cybersecurity (93466) del Corso di Laurea in Informatica.
A LaTeX template for writing your thesis. Implements all of the recommendations by DISI at the University of Bologna
11925 Risorse per il corso di architettura degli elaboratori al corso di laurea in informatica a Unibo
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9…
Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…
GUC - Go UnderCover : Switch appearance from *unix to Windows ( Kali-undercover for all distros )
The original sources of MS-DOS 1.25, 2.0, and 4.0 for reference purposes
PowerShell Module with Security cmdlets for security work
Hunt down social media accounts by username across social networks