Skip to content
View graniet's full-sized avatar
🏴‍☠️
🏴‍☠️

Highlights

  • Pro

Organizations

@wirelabs-ai

Block or report graniet

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
21 stars written in C
Clear filter

The PHP Interpreter

C 39,600 7,961 Updated Nov 8, 2025

UNIX-like reverse engineering framework and command-line toolset

C 22,568 3,134 Updated Nov 8, 2025

A repository for learning various heap exploitation techniques.

C 8,181 1,229 Updated Oct 29, 2025

A command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.

C 7,710 301 Updated Nov 5, 2024

Course materials for Modern Binary Exploitation by RPISEC

C 5,869 909 Updated Dec 9, 2021

A low-power E-Paper weather display powered by an ESP32 microcontroller. Utilizes the OpenWeatherMap API.

C 5,624 398 Updated Oct 8, 2025

A tool to dump the login password from the current linux user

C 4,039 648 Updated Sep 5, 2025

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

C 2,393 334 Updated Sep 22, 2024

Connect like there is no firewall. Securely.

C 1,759 157 Updated Sep 27, 2025

Wiki-like CTF write-ups repository, maintained by the community. 2016

C 1,631 498 Updated Oct 2, 2018

NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.

C 1,522 700 Updated Dec 8, 2020

A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.

C 976 316 Updated Dec 13, 2017

Demos of various injection techniques found in malware

C 794 188 Updated Feb 15, 2022

A tool to help you write binary exploits

C 605 106 Updated Feb 21, 2019

A collection of source code for various botnets.

C 562 139 Updated Oct 9, 2019

Self-contained Tor from Go

C 559 51 Updated Dec 14, 2021

This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.

C 448 126 Updated Oct 2, 2025

Some pwn challenges selected for training and education.

C 388 40 Updated Jun 26, 2023

Collection of scripts and writeups

C 321 34 Updated Dec 14, 2021

Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC

C 305 55 Updated Aug 16, 2024

The source code of the Zeus Evolution botnet that used TOR.

C 4 7 Updated Jan 31, 2017