-
hackingiscool
- Poland
- https://hackingiscool.pl/
- in/julian-31337
- @ewilded
- All languages
- Assembly
- AutoIt
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- CoffeeScript
- D
- Dockerfile
- Go
- Go Template
- HCL
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Meson
- Nim
- OCaml
- Objective-C
- Objective-C++
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- Ruby
- Rust
- Shell
- Smali
- Smarty
- Swift
- TeX
- TypeScript
- VBA
- Verilog
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YARA
Starred repositories
Resolve offsets, gadgets and symbols from NTKernel
Force Remove Copilot, Recall and More in Windows 11
Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)
Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopeful…
EDR-Redir : a tool used to redirect the EDR's folder to another location.
PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.
PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads
Driver Buddy Revolutions for Ghidra
IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.
PoC for popping a system shell against the LnvMSRIO.sys driver
Decyx: AI-powered Ghidra extension for enhanced reverse engineering and binary analysis.
DriverBuddyGhidra is a collection of Python scripts for analyzing Windows drivers in Ghidra, such as finding device names and IOCTL handlers
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W
Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks
A set of plugins for Ghidra and x64Dbg synchronization. A faster, more flexible ret-sync.
Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.
Automatically identify and extract potential anti-debugging techniques used by malware.
Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopefully…
The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷
Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking
AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.