Lists (20)
Sort Name ascending (A-Z)
- All languages
- ASP
- Assembly
- AutoHotkey
- AutoIt
- Ballerina
- Batchfile
- Boo
- C
- C#
- C++
- CMake
- CSS
- Classic ASP
- Clojure
- CodeQL
- CoffeeScript
- Common Lisp
- Crystal
- D
- Dart
- Dhall
- Dockerfile
- Elixir
- Elm
- Emacs Lisp
- Erlang
- Fantom
- FreeBASIC
- FreeMarker
- GDScript
- Gleam
- Go
- HCL
- HTML
- Haskell
- Haxe
- Inno Setup
- JSON
- Java
- JavaScript
- Jinja
- Jsonnet
- Julia
- Jupyter Notebook
- Just
- Kaitai Struct
- Kotlin
- LLVM
- Less
- Logos
- Lua
- MDX
- Makefile
- Markdown
- Meson
- Mojo
- MoonBit
- MoonScript
- NSIS
- Nim
- Nix
- OCaml
- Objective-C
- Objective-C++
- Odin
- PHP
- PLpgSQL
- POV-Ray SDL
- Pascal
- Pawn
- Perl
- PowerShell
- Prolog
- PureBasic
- Python
- QML
- QMake
- R
- Reason
- Red
- Rich Text Format
- Riot
- Roff
- Ruby
- Rust
- SCSS
- SWIG
- Scala
- Shell
- Smali
- Smarty
- Starlark
- Stylus
- Svelte
- Swift
- TSQL
- TeX
- TypeScript
- Typst
- V
- VBA
- VBScript
- Vala
- Vim Script
- Visual Basic
- Visual Basic .NET
- Visual Basic 6.0
- Vue
- XSLT
- YARA
- Zig
- sed
Starred repositories
Collection of malware source code for a variety of platforms in an array of different programming languages.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
Dozens of minimal operating systems to learn x86 system programming. Tested on Ubuntu 17.10 host in QEMU 2.10 and real hardware. Userland cheat at: https://github.com/cirosantilli/linux-kernel-modu…
A library for calling C functions from Go without Cgo
AV/EDR evasion via direct system calls.
AV/EDR evasion via direct system calls.
Template-Driven AV/EDR Evasion Framework
flat assembler 1 - reconstructed source history
indirect syscalls for AV/EDR evasion in Go assembly
X86 version of syswhispers2 / x86 direct system call
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)
A technique of hiding malicious shellcode via Shannon encoding.
A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.
some pentest scripts & tools by yaseng@uauc.net
Collection of libraries for use with x86 / x64 assembler
xenoscr / SysWhispers2
Forked from jthuraisamy/SysWhispers2AV/EDR evasion via direct system calls.
An example of how x64 kernel shellcode can dynamically find and use APIs
A universal anti-cheat tool for windows/macOS/linux. Only x64 programs are supported.