Highlights
- Pro
Lists (4)
Sort Name ascending (A-Z)
- All languages
- Arduino
- Assembly
- AutoHotkey
- AutoIt
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CMake
- CSS
- Clojure
- Common Lisp
- Dart
- Dockerfile
- F*
- GDScript
- Go
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Markdown
- Meson
- NSIS
- Nim
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QMake
- R
- Roff
- Ruby
- Rust
- Scala
- Shell
- Smali
- Swift
- TeX
- TypeScript
- VBA
- VBScript
- Vim Script
- Visual Basic
- Visual Basic .NET
- XSLT
- YARA
Starred repositories
Example of call stack spoofing trough the construction of syntetic frames and stack manipulation
This tool will allow you to spoof the return addresses of your functions as well as system functions.
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
Implementation of Indirect Syscall technique to pop a calc.exe
Repository hosting the bluehammer vulnerability
Lightweight Windows .jar to .exe converter using a Node.js script.
Fileless C2 agent written in pure x64 Assembly for Linux. Features stealth ICMP tunneling, memory-only execution via memfd_create, and terminal-independent daemonization.
Modular C2 server to tame your pack of wolves
This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".
JMRTD: Machine Readable Travel Documents (fork from Sourceforge)
Claude Code is an agentic coding tool that lives in your terminal, understands your codebase, and helps you code faster by executing routine tasks, explaining complex code, and handling git workflo…
macos-kernel-exploits MacOS平台提权漏洞集合 https://www.sec-wiki.com
linux-kernel-exploits Linux平台提权漏洞集合
windows-kernel-exploits Windows平台提权漏洞集合
Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
Proof-of-Concept exploits for CVEs found by the team at Rhino Security Labs
Latest CVEs with their Proof of Concept exploits.
A collection of C++ headers which make it easier to write Python C extension modules.
A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.
kunkillable is an LKM that makes userland processes unkillable.
kprochide is an LKM for hiding processes from the userland. The module is able to hide multiple processes and is able to dynamically receive new processes to hide.
Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)