Skip to content
View Mayth3m's full-sized avatar
🦾
أمي كم أهواها، أشتاق لمرآها وأحن لألقاها، وأقبّل يمناها.
🦾
أمي كم أهواها، أشتاق لمرآها وأحن لألقاها، وأقبّل يمناها.
  • SystemsLTD
  • UAE, cpx.net
  • Joined Jun 17, 2024
Block or Report

Block or report Mayth3m

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
8 stars written in C
Clear filter

proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained p…

C 9,570 1,069 Updated Jul 3, 2024

JWT brute force cracker written in C

C 2,338 251 Updated Jun 2, 2023

Research code & papers from members of vx-underground.

C 1,068 218 Updated Dec 7, 2021

Seven Degrees of Domain Admin, used by advanced and professional red teamer to catch ( Big fish ), enumerate, attacks, or poisoning target inside an LDAP Directory ( All OS/2 ) and networks :: a de…

C 21 3 Updated Jul 3, 2024

WannaCry ransomware 𓆰𓆪

C 21 4 Updated May 15, 2024

Performing a ( hard-core ) force attack to get the correct credentials in under one minute

C 19 1 Updated Jun 29, 2024

Given the increasing acceptance of online informations : This malware is often used to form botnets or enabling initial access for the Conti ransomware or Ryuk banking trojan. 7R0J4N is developed a…

C 14 1 Updated May 4, 2024

Prevent users from accessing connected online services

C 3 Updated Jun 10, 2024