Skip to content
View ajq2679's full-sized avatar
  • 08:51 (UTC -05:00)

Block or report ajq2679

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

154 stars written in C
Clear filter

Proof of concept for pwnkit vulnerability

C 344 43 Updated Jan 12, 2023

A shellcode function to encrypt a running process image when sleeping.

C 343 58 Updated Sep 11, 2021

An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security

C 341 92 Updated Jul 30, 2017

baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability

C 341 64 Updated Sep 27, 2023

The world's worst kernel module

C 299 6 Updated Aug 12, 2021

WMI virus, because funny

C 296 57 Updated Jan 29, 2025

Cobalt Strike BOF for evasive .NET assembly execution

C 284 36 Updated Mar 31, 2025

Gain observability into any Linux command or application with no code modification

C 283 35 Updated Mar 20, 2024

Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them

C 283 56 Updated Sep 19, 2017

Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components

C 271 40 Updated Aug 4, 2021

Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.

C 260 58 Updated Sep 22, 2023

This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.

C 258 33 Updated Apr 29, 2023

BPFDoor Source Code. Originally found from Chinese Threat Actor Red Menshen

C 257 99 Updated May 11, 2022

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

C 252 77 Updated Aug 14, 2025

PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.

C 227 37 Updated Jun 1, 2021

Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows

C 217 28 Updated Aug 12, 2022

Windows USB Driver for Sony DualShock 3 Controllers

C 209 17 Updated Jul 27, 2023

Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak

C 206 29 Updated Feb 16, 2023

Stand-alone VNC server compiled as a Reflective DLL

C 198 58 Updated Apr 20, 2019

Windows XP 32-Bit Bootkit

C 145 68 Updated Dec 29, 2014

DLL Password Filter Implant with Exfiltration Capabilities

C 138 23 Updated Feb 24, 2020

LD_PRELOAD rootkit

C 137 32 Updated Feb 29, 2024

Get your data from the resource section manually, with no need for windows apis

C 65 17 Updated Oct 22, 2024

In line function hooking LKM rootkit

C 52 16 Updated Mar 5, 2020

TCP over HTTP

C 50 3 Updated Oct 16, 2023

Run commands on linux through those pesky firewalls

C 28 8 Updated Jul 21, 2015

NGINX module to allow for RCE through a specific header

C 27 8 Updated Oct 17, 2022