Skip to content
View w181496's full-sized avatar
:shipit:✌✌✌✌✌✌✌✌✌✌✌✌
🏴 403 Forbidden
:shipit:✌✌✌✌✌✌✌✌✌✌✌✌
🏴 403 Forbidden

Organizations

@DoubleSigma @balsn

Block or report w181496

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
59 stars written in C
Clear filter

The PHP Interpreter

C 39,960 8,020 Updated Apr 3, 2026

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

C 25,486 3,203 Updated Mar 31, 2026

UNIX-like reverse engineering framework and command-line toolset

C 23,360 3,185 Updated Apr 3, 2026

A little tool to play with Windows security

C 21,378 4,051 Updated May 11, 2025

GoAccess is a real-time web log analyzer and interactive viewer that runs in a terminal in *nix systems or through your browser.

C 20,381 1,170 Updated Apr 1, 2026

Share your terminal over the web

C 11,346 1,116 Updated Apr 2, 2026

A fast image processing library with low memory needs.

C 11,209 754 Updated Apr 3, 2026

proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained p…

C 10,544 1,208 Updated Jan 11, 2026

RandomX, KawPow, CryptoNight and GhostRider unified CPU/GPU miner and RandomX benchmark

C 9,872 3,812 Updated Mar 28, 2026

windows-kernel-exploits Windows平台提权漏洞集合

C 8,626 2,863 Updated Jun 11, 2021

A repository for learning various heap exploitation techniques.

C 8,571 1,256 Updated Mar 26, 2026

Defeating Windows User Account Control

C 7,468 1,418 Updated Feb 17, 2026

linux-kernel-exploits Linux平台提权漏洞集合

C 5,591 1,733 Updated Jul 13, 2020

3proxy - tiny free proxy server

C 5,043 897 Updated Apr 3, 2026

A tool to dump the login password from the current linux user

C 4,090 647 Updated Sep 5, 2025

🐛 Access your device from anywhere via the web.

C 4,004 542 Updated Mar 30, 2026

Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)

C 3,324 535 Updated Mar 26, 2026

JWT brute force cracker written in C

C 2,540 270 Updated Jun 2, 2023

Hardware backdoors in some x86 CPUs

C 2,390 221 Updated Oct 12, 2018

Abusing impersonation privileges through the "Printer Bug"

C 2,214 365 Updated Sep 10, 2020

LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquir…

C 1,963 367 Updated Mar 31, 2026

Windows Event Log Killer

C 1,813 306 Updated Sep 21, 2023

Interactive CTF Exploration Tool

C 1,666 265 Updated Sep 17, 2021

Resources related to GitHub Security Lab

C 1,596 281 Updated Dec 2, 2025

Windows Privilege Escalation from User to Domain Admin.

C 1,455 222 Updated Dec 18, 2022

CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost

C 1,351 341 Updated Dec 7, 2020

bypass disable_functions via LD_PRELOA (no need /usr/sbin/sendmail)

C 1,171 279 Updated Aug 7, 2021

IPv6 attack toolkit

C 1,167 226 Updated Sep 14, 2025

PTT BBS source code

C 1,163 142 Updated Mar 10, 2026

Collection of PoC and offensive techniques used by the BlackArrow Red Team

C 1,148 188 Updated Jul 19, 2024
Next