- Barcelona, Spain
- http://breakingcode.wordpress.com/
Stars
- All languages
- AMPL
- ActionScript
- Arduino
- Assembly
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- Component Pascal
- Cython
- Dockerfile
- Eagle
- Erlang
- Gherkin
- Go
- Groovy
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kaitai Struct
- Kotlin
- Logos
- Lua
- Makefile
- Meson
- OCaml
- Objective-C
- Objective-C++
- PHP
- Pascal
- Perl
- PowerShell
- Python
- R
- REXX
- Rich Text Format
- Roff
- Ruby
- Rust
- Scala
- Scilab
- Shell
- Smarty
- Standard ML
- Swift
- TeX
- TypeScript
- Vala
- Verilog
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
AirPods liberated from Apple's ecosystem.
Windows capability development using GCC and GNU Make
Windows User-Mode Shellcode Development Framework (WUMSDF)
Anthropic's Interactive Prompt Engineering Tutorial
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A powerful command-line interface for the endoflife.date API. Query end-of-life dates and support lifecycles for various products directly from your terminal.
Software-based TOTP/HOTP authenticator for Flipper Zero device.
Source code behind the Windows Subsystem for Linux documentation.
Enabling the Windows Subsystem for Linux to include support for Wayland and X server related scenarios
The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)
Writeups of some Reverse Engineering challenges in CTFs I played
A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.
A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables tha…
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
An enterprise friendly way of detecting and preventing secrets in code.
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and Online KMS activation methods, along with advanced troubleshooting.
A multiplayer game about paranoia and chaos on a space station. Remake of the cult-classic Space Station 13.
Takes a URL and checks the system for the tilde enum vuln and then find the files.
A tool to verify and create PE Checksums for Portable Executable (PE) files.
Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unauthorized modifications to the Windows kernel. The analysis is…