- Barcelona, Spain
- http://breakingcode.wordpress.com/
Stars
- All languages
- AMPL
- ActionScript
- Arduino
- Assembly
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- Component Pascal
- Cython
- Dockerfile
- Eagle
- Erlang
- Gherkin
- Go
- Groovy
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kaitai Struct
- Kotlin
- Logos
- Lua
- Makefile
- Meson
- OCaml
- Objective-C
- Objective-C++
- PHP
- Pascal
- Perl
- PowerShell
- Python
- R
- REXX
- Rich Text Format
- Roff
- Ruby
- Rust
- Scala
- Scilab
- Shell
- Smarty
- Standard ML
- Swift
- TeX
- TypeScript
- Vala
- Verilog
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
Super Strong and Fast Othello AI / Computer Othello Reversi
Production-grade Abstract Syntax Tree parser for IDS/IPS rules (Suricata/Snort) with comprehensive validation and serialization support.
AirPods liberated from Apple's ecosystem.
Windows capability development using GCC and GNU Make
Windows User-Mode Shellcode Development Framework (WUMSDF)
Anthropic's Interactive Prompt Engineering Tutorial
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A powerful command-line interface for the endoflife.date API. Query end-of-life dates and support lifecycles for various products directly from your terminal.
Software-based TOTP/HOTP authenticator for Flipper Zero device.
Source code behind the Windows Subsystem for Linux documentation.
Enabling the Windows Subsystem for Linux to include support for Wayland and X server related scenarios
The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)
DoctorKisow / vsftpd-2.3.4
Forked from lyndon160/vsftpd-backdoorThis repository is a version of vsftpd-2.3.4 with the backdoor patch included. To be used as an example to demonstrate backdoor entry into another system.
Writeups of some Reverse Engineering challenges in CTFs I played
A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.
A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables tha…
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
An enterprise friendly way of detecting and preventing secrets in code.