- Poland
Stars
Cheat Engine. A development environment focused on modding
All 11 years of adventofcode.com solutions in Go/Golang (and a little Python); 2015-2025
The driver file for the ePaper display driver IC (IL3897) with parameters selected for a 250x122 Lolin 2.13 inch EPD.
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
ATTiny usb bootloader with a strong emphasis on bootloader compactness.
Arduino library for USB PD sink controller (STUSB4500)
Partial Port of Adafruit CircuitPython to Micropython of PN532 NFC/RFID control library (SPI)
weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interesting functionality in large codebases.
Experimental opaque predicate detection for IDA Pro
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
Ray is an AI compute engine. Ray consists of a core distributed runtime and a set of AI Libraries for accelerating ML workloads.
Project HashClash - MD5 & SHA-1 cryptanalysis
radius2 is a fast binary emulation and symbolic execution framework using radare2
Source code of a multiple series of tutorials about the hypervisor. Available at: https://rayanfam.com/tutorials
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.
Dockerfile linter, validate inline bash, written in Haskell
Reverse engineering tool for linux games
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.
The best way to tail AWS CloudWatch Logs from your terminal
Hackish way to intercept and modify non-HTTP protocols through Burp & others.
Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.