Skip to content
View Te-k's full-sized avatar

Block or report Te-k

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
6 stars written in C
Clear filter

The pattern matching swiss knife

C 9,582 1,559 Updated Feb 10, 2026

Leaked Mirai Source Code for Research/IoC Development Purposes

C 9,284 3,517 Updated Oct 16, 2025

Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)

C 5,058 397 Updated Mar 15, 2026

The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digi…

C 3,053 687 Updated Apr 27, 2026

Active Directory Control Paths auditing and graphing tools

C 679 101 Updated Dec 17, 2020

Analysis and detection engineering for the BlueHammer Windows Defender local privilege escalation vulnerability. This repo includes bug fixes, 7 Sigma rules, 4 YARA rules, and MITRE ATT&CK-mapped t…

C 65 32 Updated Apr 8, 2026