shekk's repositories
algorithms-2
Minimal examples of data structures and algorithms in Python
analysis-of-anti-analysis
writings on anti-reverse engineering
BinExp
Linux Binary Exploitation
CMSeeK
CMS (Content Management Systems) Detection and Exploitation suite
cpplinks
A categorized list of C++ resources.
ctf-writeups-6
Collection of scripts and writeups
debugmenot
Collection of simple anti-debugging tricks for Linux
dumptask
A simple kernel module to dump the tasks
fakechroot
gives a fake chroot environment
liboqs
C library for quantum-resistant cryptographic algorithms.
linux-exploitation-course
A Course on Intermediate Level Linux Exploitation
linux-kernel-defence-map
Linux Kernel Defence Map
Linux.RV
POC Reverse Text segment ELF File infector
Log-killer
Clear all your logs in [linux/windows] servers 🛡️
lsrootkit
Rootkit Detector for UNIX
memcached-PoC
MemcacheD Proof of Concept
nemesis
A command-line network packet crafting and injection utility
Pinkit
A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.
PIvirus
sample linux x86_64 ELF virus
Project-Based-Tutorials-in-C
A curated list of project-based tutorials in C
raspberry-pi-os
Learning operating system development using Linux kernel and Raspberry Pi
shellcheck
ShellCheck, a static analysis tool for shell scripts
shellen
Interactive shellcoding environment to easily craft shellcodes
shellharden
A bash syntax highlighter that encourages (and can fix) proper quoting of variables
snidump
This is a tcpdump-like program for printing TLS SNI and HTTP/1.1 Host fields in live or captured traffic.
takeover
Sub-Domain TakeOver Vulnerability Scanner
TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .