- Barcelona, Spain
- http://breakingcode.wordpress.com/
Stars
- All languages
- AMPL
- ActionScript
- Arduino
- Assembly
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- Component Pascal
- Cython
- Dockerfile
- Eagle
- Erlang
- Gherkin
- Go
- Groovy
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kaitai Struct
- Kotlin
- Logos
- Lua
- Makefile
- Meson
- OCaml
- Objective-C
- Objective-C++
- PHP
- Pascal
- Perl
- PowerShell
- Python
- R
- REXX
- Rich Text Format
- Roff
- Ruby
- Rust
- Scala
- Scilab
- Shell
- Smarty
- Standard ML
- Swift
- TeX
- TypeScript
- Vala
- Verilog
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
Source code behind the Windows Subsystem for Linux documentation.
Enabling the Windows Subsystem for Linux to include support for Wayland and X server related scenarios
The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)
DoctorKisow / vsftpd-2.3.4
Forked from lyndon160/vsftpd-backdoorThis repository is a version of vsftpd-2.3.4 with the backdoor patch included. To be used as an example to demonstrate backdoor entry into another system.
Writeups of some Reverse Engineering challenges in CTFs I played
A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.
A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables tha…
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
An enterprise friendly way of detecting and preventing secrets in code.
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
A multiplayer game about paranoia and chaos on a space station. Remake of the cult-classic Space Station 13.
Takes a URL and checks the system for the tilde enum vuln and then find the files.
A tool to verify and create PE Checksums for Portable Executable (PE) files.
Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unauthorized modifications to the Windows kernel. The analysis is…
Fast and lightweight x86/x86-64 disassembler and code generation library
Invert scroll direction for physical scroll wheels while maintaining "Natural" scrolling for trackpads on MacOS
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the process of constructing and utilizing structures, assigning varia…
Adds back the /scores JSON API for ctftime.org
Bypassing PatchGuard on modern x64 systems
Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data