_______________________________
< Our weapons are our keyboards >
--------------------------------
\
\ ^__^
(oo)\_______
( (__)\ )\/\
_) / ||----w |
(.)/ || ||
`' ^^ ^^
______________________________________________
/ panji take pc 18h/24h \
| u can found him on telegram everytime online |
| [#] info about me : https://t.me/o_zakariya |
\ dm me : https://t.me/x86byte /
-----------------------------------------------
✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹
✹ ilove fuzzing ✹
✹ RCE lover ✹
✹ EIP fucker ✹
✹ Exploit Developer? ✹
✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹
Rootkits is like sex, it's better when it's fully penetrate!
- 0x4141414141414141
Pinned Loading
-
-
Stuxnet-Rootkit
Stuxnet-Rootkit PublicStuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
-
pegasus-JB-PoC
pegasus-JB-PoC PublicForked from rohitwas/pegasus-JB-PoC
Pegasus exploit port to iOS
Objective-C
-
azureOutlookC2
azureOutlookC2 PublicForked from boku7/azureOutlookC2
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Mi…
C 2
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.