Skip to content
View JohnRyk's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report JohnRyk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
48 stars written in C
Clear filter

UNIX-like reverse engineering framework and command-line toolset

C 23,536 3,207 Updated Apr 27, 2026

A little tool to play with Windows security

C 21,465 4,092 Updated Apr 17, 2026

Small and highly portable detection tests based on MITRE's ATT&CK.

C 11,860 3,102 Updated Apr 24, 2026

Defeating Windows User Account Control

C 7,528 1,419 Updated Feb 17, 2026

Arkime is an open source, large scale, full packet capturing, indexing, and database system.

C 7,359 1,140 Updated Apr 27, 2026

Course materials for Modern Binary Exploitation by RPISEC

C 5,967 907 Updated Dec 9, 2021

Simple (relatively) things allowing you to dig a bit deeper than usual.

C 3,498 558 Updated Apr 21, 2026

Fork of http://sourceforge.net/projects/mjpg-streamer/

C 3,227 1,262 Updated Aug 8, 2024

🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)

C 3,198 686 Updated Feb 15, 2023

JWT brute force cracker written in C

C 2,543 270 Updated Jun 2, 2023

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

C 2,226 297 Updated Aug 15, 2024

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

C 2,092 358 Updated May 28, 2025

🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc

C 2,012 504 Updated Jul 13, 2022

A little toolbox to play with Microsoft Kerberos in C

C 1,516 222 Updated Dec 14, 2021

Crack password hashes without the fuss 🐈

C 1,392 173 Updated Jan 10, 2022

Linux Binary Exploitation

C 1,357 209 Updated Jun 15, 2021

Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation

C 1,300 204 Updated Jun 21, 2022

proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC

C 1,282 299 Updated May 1, 2024

Vulnerable server used for learning software exploitation

C 1,114 270 Updated Oct 9, 2020

SQL / SQLI tokenizer parser analyzer

C 1,030 282 Updated Oct 4, 2023

Cobalt Strike UDRL for memory scanner evasion.

C 1,014 179 Updated Jun 4, 2024

IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.

C 887 152 Updated Oct 5, 2025

Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.

C 820 313 Updated Apr 11, 2023

Execute unmanaged Windows executables in CobaltStrike Beacons

C 719 105 Updated Mar 4, 2023

Simulate the behavior of AV/EDR for malware development training.

C 567 48 Updated Feb 15, 2024

kadimus is a tool to check and exploit lfi vulnerability.

C 567 129 Updated Aug 17, 2020

A couple of methods for detecting Frida on Android.

C 496 122 Updated Mar 17, 2022

http://firmware-mod-kit.googlecode.com/svn/trunk

C 315 117 Updated Sep 27, 2024

IoT安全教程

C 300 66 Updated Mar 19, 2020
Next