Hijacking (intercepting) system calls by writing and installing a very basic kernel module to the Linux kernel.
-
Updated
Feb 25, 2020 - C
Hijacking (intercepting) system calls by writing and installing a very basic kernel module to the Linux kernel.
Pentesting Live Targets
A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier
Social Network Analysis focused on the events of 9/11/2001. By examining publicly available data through SNA techniques, we gain insights into the organizational structure of the terrorist network, offering valuable perspectives on key relationships and connections.
University Project - Hijacking Tool for Sonos Network Speakers
This App allows you to Broadcast your own Music to every radio in a specific range using a custom frequency. It requires a Raspberry Pi and PiFmRds Project found on Github.
An utility class for determining static compilation functions in any ELF file.
DroneCharmer2 is an upgraded version of github.com/tukru/DroneCharmer inspired by the badass motherfuckers in Ukraine! <3
Hijack user account through phishing web site with use of helium browser
A simple walkthrough on Windows Screensaver Hijacking for persistence.
Para Injeção de Codigos e DLL's em Processos
Add a description, image, and links to the hijacking topic page so that developers can more easily learn about it.
To associate your repository with the hijacking topic, visit your repo's landing page and select "manage topics."