Skip to content
View wangray's full-sized avatar

Organizations

@TheMITTech @x64dbg @TechSecCTF

Block or report wangray

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
44 stars written in C
Clear filter

Modern HTTP benchmarking tool

C 40,211 3,035 Updated Dec 30, 2023

UNIX-like reverse engineering framework and command-line toolset

C 23,444 3,195 Updated Apr 16, 2026

Official QEMU mirror. Please see https://www.qemu.org/contribute/ for how to submit changes to QEMU. Pull Requests are disabled. Please only use release tarballs from the QEMU website.

C 13,004 6,690 Updated Apr 14, 2026

Extremely fast non-cryptographic hash algorithm

C 10,980 890 Updated Apr 13, 2026

The single instruction C compiler

C 10,170 414 Updated May 29, 2024

A repository for learning various heap exploitation techniques.

C 8,588 1,259 Updated Apr 16, 2026

linux-kernel-exploits Linux平台提权漏洞集合

C 5,595 1,730 Updated Jul 13, 2020

CTF竞赛权威指南

C 4,454 711 Updated Jul 27, 2024

A small utility to modify the dynamic linker and RPATH of ELF executables

C 4,182 524 Updated Dec 15, 2025

A library of common data structures and algorithms written in C.

C 3,595 742 Updated Mar 17, 2026

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

C 3,257 818 Updated Sep 3, 2022

Platform for Architecture-Neutral Dynamic Analysis

C 2,730 498 Updated Feb 14, 2026

Read-only mirror of Trusted Firmware-A

C 2,195 1,554 Updated Apr 13, 2026

Windows tool for dumping malware PE files from memory back to disk for analysis.

C 1,835 281 Updated Sep 3, 2024

Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU

C 1,683 250 Updated Feb 14, 2024

Some helpful preload libraries for pwning stuff.

C 1,648 176 Updated Mar 6, 2026

Automating x64dbg using Python, Snapshots:

C 1,503 72 Updated Apr 5, 2023

Library and command line tool to detect SHA-1 collision in a file

C 1,392 217 Updated Oct 30, 2025

This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.

C 1,284 120 Updated Oct 7, 2022

xAnalyzer plugin for x64dbg

C 1,204 122 Updated Aug 13, 2025

The main libseccomp repository

C 905 191 Updated Apr 10, 2026

For Linux binary Exploitation

C 848 195 Updated Mar 26, 2018

DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidSco…

C 837 167 Updated Nov 19, 2024

kernel-pwn and writeup collection

C 711 38 Updated Oct 2, 2023

binary patching from Python

C 639 83 Updated Jul 6, 2023

Stand-alone Native Linux KVM Tool repo

C 619 170 Updated Oct 8, 2024

chw00t - Unices chroot breaking tool

C 617 56 Updated Jun 13, 2019
C 522 144 Updated Feb 22, 2020

A minimal kvm example

C 521 149 Updated Jul 30, 2022
Next