Skip to content
View x86byte's full-sized avatar
:octocat:
Rootkits is like sex, it's better when it's fully penetrate!
:octocat:
Rootkits is like sex, it's better when it's fully penetrate!

Block or report x86byte

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
x86byte/README.md

u know what?

        _______________________________
       < Our weapons are our keyboards >
        --------------------------------
                  \
                   \ ^__^
                     (oo)\_______
                  (  (__)\       )\/\
                   _) /  ||----w |
                  (.)/   ||     ||
                   `'    ^^     ^^

 ______________________________________________
/            panji take pc 18h/24h              \
|  u can found him on telegram everytime online |
| [#] info about me : https://t.me/o_zakariya   |
\           dm me : https://t.me/x86byte        /
 -----------------------------------------------
✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹
✹ ilove fuzzing                               ✹
✹ RCE lover                                   ✹
✹ EIP fucker                                  ✹
✹ Exploit Developer?                          ✹
✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹✹

Pinned Loading

  1. RE-MA-Roadmap RE-MA-Roadmap Public

    Reverse Engineering and Malware Analysis Roadmap

    46 8

  2. ROPme ROPme Public

    Windows Exploit development : Bypass Data Execution Prevention (DEP) using ROP chains manually hard code

    Python 5

  3. Stuxnet-Rootkit Stuxnet-Rootkit Public

    Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis

    C 45 10

  4. APTX4869 APTX4869 Public

    The Never-Ending Hide and Seek: The Tale of APTX4869 Rootkit

    C 9 3

  5. pegasus-JB-PoC pegasus-JB-PoC Public

    Forked from rohitwas/pegasus-JB-PoC

    Pegasus exploit port to iOS

    Objective-C

  6. azureOutlookC2 azureOutlookC2 Public

    Forked from boku7/azureOutlookC2

    Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Mi…

    C 2