Skip to content
View dhondta's full-sized avatar

Highlights

  • Pro

Block or report dhondta

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
21 stars written in C
Clear filter

UNIX-like reverse engineering framework and command-line toolset

C 23,348 3,180 Updated Mar 31, 2026

MicroPython - a lean and efficient Python implementation for microcontrollers and constrained systems

C 21,592 8,771 Updated Apr 1, 2026

A little tool to play with Windows security

C 21,370 4,047 Updated May 11, 2025

Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, T…

C 8,635 1,671 Updated Mar 30, 2026

Arkime is an open source, large scale, full packet capturing, indexing, and database system.

C 7,337 1,139 Updated Apr 1, 2026

The official git repository for Contiki, the open source OS for the Internet of Things

C 3,795 2,574 Updated Apr 6, 2024

CTF Field Guide

C 1,420 245 Updated Nov 15, 2024

Instrument Cluster Simulator

C 942 243 Updated Sep 18, 2025

The PE file analysis toolkit

C 770 140 Updated Mar 21, 2026

This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.

C 751 112 Updated Nov 30, 2025

This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to …

C 687 83 Updated Jul 6, 2024

The Yes We CAN project of Canis Labs

C 381 71 Updated Apr 1, 2024

🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engineering.(使用C和Intel x86汇编开发的Windows x86可执行文件打包工具,打包后的新文件可以阻碍逆向工程。)

C 355 54 Updated Oct 22, 2024

A tutorial on how to write a packer for Windows!

C 311 31 Updated Dec 15, 2023

Local privilege escalation PoC for Linux kernel CVE-2022-1015

C 206 31 Updated Apr 3, 2022

Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu

C 201 29 Updated Jan 4, 2022

Security advisories

C 168 65 Updated May 30, 2016

Files for the packer tutorial

C 78 22 Updated Feb 21, 2021

Statically Compiled Tools that could be used in engagements

C 17 6 Updated Aug 29, 2022

easy ELF packer

C 7 3 Updated Apr 26, 2019