Skip to content
View Pengrey's full-sized avatar
🐲
Focusing
🐲
Focusing

Block or report Pengrey

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
66 stars written in C
Clear filter

Collection of various algorithms in mathematics, machine learning, computer science, physics, etc implemented in C for educational purposes.

C 21,970 4,739 Updated Aug 7, 2024

A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals…

C 14,290 1,661 Updated Apr 26, 2026

The Minimalistic x86/x64 API Hooking Library for Windows

C 5,720 1,051 Updated Nov 3, 2025

Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

C 4,558 739 Updated Jul 8, 2025

A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.

C 1,859 241 Updated Nov 3, 2024

Situational Awareness commands implemented using Beacon Object Files

C 1,783 285 Updated Mar 10, 2026

Macro-header for compile-time C obfuscation (tcc, win x86/x64)

C 1,610 133 Updated Feb 14, 2026

NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.

C 1,556 696 Updated Dec 8, 2020

Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods & tokens from Chrome, Edge, Brave & Avast - fileless, user-…

C 1,555 259 Updated Feb 9, 2026

Dump cookies and credentials directly from Chrome/Edge process memory

C 1,445 136 Updated Apr 9, 2026

HVNC for Cobalt Strike

C 1,323 204 Updated Dec 7, 2023

A modern 32/64-bit position independent implant template

C 1,319 215 Updated Mar 21, 2025

Public open-source code of malware Stuxnet (aka MyRTUs).

C 1,218 187 Updated Aug 27, 2022

Cobalt Strike UDRL for memory scanner evasion.

C 1,015 179 Updated Jun 4, 2024

A BOF that runs unmanaged PEs inline

C 695 86 Updated Oct 23, 2024

Aims to identify sleeping beacons

C 667 63 Updated Jan 25, 2026

(Unofficial) Mirror of mingw-w64-code

C 558 88 Updated Apr 23, 2026

BOF to steal browser cookies & credentials

C 523 52 Updated Mar 4, 2026

Malware Development for Ethical Hackers, published by Packt

C 484 102 Updated Jan 29, 2026

Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.

C 376 57 Updated Aug 29, 2025

Embed a payload inside a PNG file

C 371 56 Updated Oct 24, 2024

Hide Process From Task Manager using Usermode API Hooking

C 361 69 Updated Aug 26, 2021

QEMU on browser

C 329 17 Updated Feb 6, 2026

LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.

C 325 37 Updated Jan 17, 2024

C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automation.

C 291 29 Updated Apr 26, 2026

RISC-V Virtual Machine

C 287 260 Updated Jun 10, 2025

Slides & Code snippets for a workshop held @ x33fcon 2024

C 281 48 Updated Jun 15, 2024

The code is a pingback to the Dark Vortex blog: https://0xdarkvortex.dev/hiding-memory-allocations-from-mdatp-etwti-stack-tracing/

C 212 41 Updated Jan 29, 2023
Next