Pinned Repositories
0x00sec_code
Code for my 0x00sec.org posts
4.4BSD-Lite2
User-mode TCP/IP stack from 4.4BSD-Lite2, a companion of TCP/IP Illustrated vol. 2
assembly-fun
Just a collection of NASM code while I learn/refresh my Assembly understanding
assembly-playground
Random code snippets used to learn x86_64 assembly language
assetMap
处于原型阶段
awesome-programming-books
📚经典技术书籍 PDF 文件,持续更新...
Awesome-Red-Teaming
List of Awesome Red Teaming Resources
backdoor
c8505 assigment 2
hacking_proj
learning in sec dev
peaceSh4wn.github.io
peaceSh4wn's Repositories
peaceSh4wn/0x00sec_code
Code for my 0x00sec.org posts
peaceSh4wn/bdvl
bdvl
peaceSh4wn/Coldfire
Golang malware development framework
peaceSh4wn/cpp-implant
A simple implant showcasing modern C++
peaceSh4wn/CS-Book
计算机类常用电子书整理,并且附带下载链接,包括Java,Python,Linux,Go,C,C++,数据结构与算法,人工智能,计算机基础,面试,设计模式,数据库,前端等书籍
peaceSh4wn/CS-Situational-Awareness-BOF
Situational Awareness commands implemented using Beacon Object Files
peaceSh4wn/dnscat2
peaceSh4wn/donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
peaceSh4wn/emp3r0r
linux post-exploitation framework made by linux user
peaceSh4wn/json-tutorial
从零开始的 JSON 库教程
peaceSh4wn/Lilith
Lilith, The Open Source C++ Remote Administration Tool (RAT)
peaceSh4wn/Linco2
模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2
peaceSh4wn/masscan
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
peaceSh4wn/OllyDbg-Archive
All the latest releases and files for OllyDbg...
peaceSh4wn/one-python-craftsman
来自一位 Pythonista 的编程经验分享,内容涵盖编码技巧、最佳实践与思维模式等方面。
peaceSh4wn/PandaSniper
Linux C2 框架demo,为期2周的”黑客编程马拉松“,从学习编程语言开始到实现一个demo的产物
peaceSh4wn/pspy
Monitor linux processes without root permissions
peaceSh4wn/public-pentesting-reports
Curated list of public penetration test reports released by several consulting firms and academic security groups
peaceSh4wn/Quickdraw-Snort
Digital Bond's IDS/IPS rules for ICS and ICS protocols.
peaceSh4wn/Red-Team
Red-Team Attack Guid
peaceSh4wn/Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
peaceSh4wn/redis
Redis is an in-memory database that persists on disk. The data model is key-value, but many different kind of values are supported: Strings, Lists, Sets, Sorted Sets, Hashes, Streams, HyperLogLogs, Bitmaps.
peaceSh4wn/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
peaceSh4wn/shad0w
A post exploitation framework designed to operate covertly on heavily monitored environments
peaceSh4wn/shellrun
Runs binary shell code. Also includes debugging and compatibillity features.
peaceSh4wn/SK8RAT
C++ implant that interfaces with a SK8PARK server
peaceSh4wn/twittor
A fully featured backdoor that uses Twitter as a C&C server
peaceSh4wn/Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
peaceSh4wn/vlany
Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)
peaceSh4wn/yulong-hids-archived
一款由 YSRC 开源的主机入侵检测系统