Highlights
- Pro
Lists (4)
Sort Name ascending (A-Z)
- All languages
- ActionScript
- Assembly
- Batchfile
- BitBake
- C
- C#
- C++
- CMake
- CSS
- Clojure
- CodeQL
- Crystal
- Cuda
- D
- Dockerfile
- Elixir
- Erlang
- F#
- GAP
- Go
- HCL
- HTML
- Handlebars
- Haskell
- JSON
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- KiCad Layout
- Kotlin
- LLVM
- Lua
- MATLAB
- Makefile
- Markdown
- Nim
- OCaml
- Objective-C
- Objective-C++
- Open Policy Agent
- OpenEdge ABL
- PHP
- PLpgSQL
- POV-Ray SDL
- Pascal
- Perl
- PowerShell
- Python
- ReScript
- Reason
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Standard ML
- Svelte
- Swift
- TeX
- TypeScript
- VBA
- Vala
- Verilog
- Vim Script
- Vue
- WebAssembly
- XSLT
- YAML
- YARA
- Zig
Starred repositories
Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999
Use a TPM to store a TOTP token in order to attest boot state to another device
UEFI DXE driver to take screenshots from GOP-compatible graphic consoles
An example driver for Windows that shows how to set-up some basic components of the Windows Filtering Platform
PageBuster - dump all executable pages of packed processes.
Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.
Detect if your container is running under a hypervisor
Packet capture on Windows without a kernel driver
Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider
Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)
a bare metal (type 1) VMM (hypervisor) with a python remote control API
Automatically exported from code.google.com/p/ioctlfuzzer
PoC for breaking hypervisor ASLR using branch target buffer collisions
bpflock - eBPF driven security for locking and auditing Linux machines
The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.