Pinned Repositories
ARPRootKit
A simple and open-source rootkit for the Linux Kernel
Black-Hat-C
I really enjoyed the book Black Hat Python by Justin Seitz. This book inspired me to port existing code into the C language. The original book is not only a great read, but can even be used as a reference when writing python programs to be used offensively. Of course when dealing with target systems, languages supported by the target vary (Although Python Is Generally Used). For this reason I decided to start this project. The original book is a must have for anyone looking to program with python in an offensive way. The original book can be purchased here: https://www.nostarch.com/blackhatpython
C-Sorts
Collection of sorting algorithms in C from a great sanfoundry.com article called "C Programming Examples on Searching & Sorting"
fiemap
fiemap ioctl() example by Colin Ian King
GPU_memdump_tools
clone of GPU mem dump tools from 2015 DFRWS Forensics Challenge. (http://www.cs.uno.edu/~golden/gpu-malware-research.html)
kaslr-bypass-via-prefetch
A proof-of-concept KASLR bypass for the Linux kernel via timing prefetch
preloadchk
LD_PRELOAD rootkit detection & research.
shekkbuilder's Repositories
shekkbuilder/blueflower
a grep -r for secrets
shekkbuilder/util-linux
shekkbuilder/algorithm-cheat
Algorithm tutorials and simple multi-language implementations with unit tests. Test case data in language agnostic file formats. Usually updated when I'm grinding for job interviews :-)
shekkbuilder/ASLRay
Linux ELF x32 and x64 ASLR bypass exploit with stack-spraying
shekkbuilder/awesome-livecoding
All things livecoding
shekkbuilder/C-3
A collection of notes, snippets, and programs for learning and using C.
shekkbuilder/C-Notes
Full C Reference and Some Useful Topics.
shekkbuilder/cmsPoc
CMS渗透测试框架-A CMS Exploit Framework
shekkbuilder/Command-line-text-processing
From finding text to search and replace, from sorting to beautifying text and more
shekkbuilder/compsize
btrfs: find compression type/ratio on a file or set of files
shekkbuilder/DNS-Shell
DNS-Shell is an interactive Shell over DNS channel
shekkbuilder/dnsdiag
DNS Diagnostics and Performance Measurement Tools
shekkbuilder/dunmer
An ELF parasite command injector.
shekkbuilder/every-programmer-should-know
A collection of (mostly) technical things every software developer should know
shekkbuilder/fd
A simple, fast and user-friendly alternative to find.
shekkbuilder/heap-challenges
Challenges where practice heap tecnics
shekkbuilder/heap_allocator
A simple heap memory allocator in ~200 lines.
shekkbuilder/InsecureProgramming
Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them
shekkbuilder/kscope
shekkbuilder/libinjection-fuzzer
This tool was written as PoC to article https://waf.ninja/libinjection-fuzz-to-bypass/
shekkbuilder/nweb
A tiny web server in C
shekkbuilder/offensive_poc
Writing PoC for fun and educate people take security seriously;-)
shekkbuilder/OSINT-SPY
Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cyber crime investigator in order to find deep information about their target. If you want to ask something please feel free to reach out to me at sharad@osint-spy.com
shekkbuilder/pcap2curl
Read a packet capture, extract HTTP requests and turn them into cURL commands for replay.
shekkbuilder/pmacct
pmacct is a small set of multi-purpose passive network monitoring tools [NetFlow IPFIX sFlow libpcap BGP BMP IGP Streaming Telemetry].
shekkbuilder/Reptile
LKM Linux rootkit
shekkbuilder/SSHPry2.0
SSHPry v2 - Spy & Control os SSH Connected client's TTY
shekkbuilder/StegCracker
Steganography brute-force utility to uncover hidden data inside files
shekkbuilder/x86-assembly-cheat
x86 userland minimal examples. Hundreds of runnable asserts. Containers (ELF), linking, calling conventions. System land cheat at: https://github.com/************/x86-bare-metal-examples
shekkbuilder/yersinia
A framework for layer 2 attacks