PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
-
Updated
Sep 26, 2023 - C
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
My public notes about offensive security
Simple dos attack utility
An opensource Prank Startup Malware for windows developed using C Programming Language.
The NIST BGP Secure Routing Extension (BGP-SRx) is an open source reference implementation and research platform for investigating emerging BGP security extensions and supporting protocols such as RPKI Origin Validation and BGPsec Path Validation.
A repository that includes common helper functions for writing applications in the DPDK. I will be using this for my future projects in the DPDK.
Program examples utilizing the DPDK. The DPDK is a kernel-bypass network library that allows for very fast network packet processing. This is great for (D)DoS mitigation and low-latency packet inspection, manipulation, and forwarding.
ARM 32-bit Raspberry Pi Char Pointer example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Float example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux.
This Repository is a collection of different Ethical Hacking Tools written in python, ruby, rust, c++, go and c.
Linux keylogger written in C
My random code for a bunch of random ideas I get out of my noggin.
THAMARA - Threat Hunting with AMSI and YARA
Hayden Housen's solutions to the 2021 PicoCTF Competition
Image Encryption and Decryption with RSA, Blowfish, and other algorithms
A collection of CTF challenges I developed.
Add a description, image, and links to the cyber-security topic page so that developers can more easily learn about it.
To associate your repository with the cyber-security topic, visit your repo's landing page and select "manage topics."