0000000O0Oo's repositories
DLLInjection
Different DLL Injections Techniques Implement as A C++ Program
BinaryExploitation
Binary Exploitation Challenges Solving and a lot of Binaries Exploitation Challenge i came across through out time
ReverseEngineering
Reverse Engineering Adventures
alacritty-theme
Collection of Alacritty color schemes
Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
bluffy
Convert shellcode into :sparkles: different :sparkles: formats!
BrainpanShellGen
Don't ask me why i made that, i probably won't answer :')
C2concealer
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
can-i-take-over-xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Crypter
Crypter - Python3 based builder and ransomware compiled to Windows executable using PyInstaller
CS-notes
Cobaltstrike notes
CTF-Challenges
CTF Challenges i came across in multiple CTF events
dirsearch
Web path scanner
flameshot
Powerful yet simple to use screenshot software :desktop_computer: :camera_flash:
HiveNightmare
Exploit allowing you to read registry hives as non-admin
json
JSON for Modern C++
k0rup710n
Config files for my GitHub profile.
Malwares
Malwares
mimikatz
A little tool to play with Windows security
ppppp
XMONAD
ramiel
uefi diskless persistence technique + OVMF secureboot bypass
reverse-engineering
List of awesome reverse engineering resources
shad0w
A post exploitation framework designed to operate covertly on heavily monitored environments
sixteencolors-archive
Artpack archive, organized by year
VXUG-Papers
Research code & papers from members of vx-underground.
WinPwnage
UAC bypass, Elevate, Persistence methods
xmrig
RandomX, CryptoNight, AstroBWT and Argon2 CPU/GPU miner