Skip to content
View rfchacks's full-sized avatar

Block or report rfchacks

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
35 stars written in C
Clear filter

proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained p…

C 9,879 1,080 Updated Aug 29, 2024

The pattern matching swiss knife

C 8,399 1,458 Updated Dec 13, 2024

windows-kernel-exploits Windows平台提权漏洞集合

C 8,159 2,842 Updated Jun 11, 2021

A repository for learning various heap exploitation techniques.

C 7,361 1,156 Updated Nov 27, 2024

proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…

C 6,881 631 Updated Jun 8, 2024

Defeating Windows User Account Control

C 6,467 1,328 Updated Jul 22, 2024

Course materials for Modern Binary Exploitation by RPISEC

C 5,557 890 Updated Dec 9, 2021

A tool to dump the login password from the current linux user

C 3,849 637 Updated May 17, 2023

Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do

C 3,463 467 Updated Jun 21, 2024

Stores your data in ICMP ping packets

C 3,118 126 Updated Aug 5, 2023

Simple reverse ICMP shell

C 1,563 415 Updated Apr 6, 2018

Post Exploitation Collection

C 1,555 359 Updated May 1, 2020

CTF Field Guide

C 1,320 242 Updated Nov 15, 2024

A Simple Unix-like operating system

C 910 47 Updated Feb 17, 2023

Web application security scanner created by lcamtuf for google - Unofficial Mirror

C 693 150 Updated Feb 18, 2023

Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.

C 665 118 Updated Jan 2, 2024

An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM

C 646 211 Updated Nov 21, 2017

chw00t - Unices chroot breaking tool

C 566 53 Updated Jun 13, 2019

Tunnel IP over ICMP.

C 452 129 Updated Oct 1, 2021

Dump various types of Windows credentials without injecting in any process.

C 420 141 Updated Jan 13, 2023

Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.

C 390 126 Updated Jul 24, 2022

Exercises for learning Reverse Engineering and Exploitation.

C 385 54 Updated Mar 1, 2019

Tips, Tricks, and Suggestions for Running a CTF

C 383 64 Updated Aug 2, 2022

BEURK Experimental Unix RootKit

C 377 96 Updated Apr 28, 2017

Hijack Putty sessions in order to sniff conversation and inject Linux commands.

C 361 75 Updated Dec 14, 2014

Database of private SSL/SSH keys for embedded devices

C 255 55 Updated Feb 9, 2024

Local UNIX PrivEsc Aggregation

C 245 97 Updated Apr 9, 2016

builds database/visualizations of LAN structure from passively sifted information

C 147 38 Updated May 30, 2014

Pivoter is a proxy tool for pentesters to have easier lateral movement.

C 139 41 Updated Aug 9, 2015

Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.

C 138 33 Updated Mar 7, 2018
Next