Skip to content
View guchinoma's full-sized avatar

Block or report guchinoma

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Some exploits, which I’ve created during my OSCE preparation.

Python 82 35 Updated Jul 7, 2018

Code Stealth Evaluation via Machine Learning

C 11 Updated Jun 30, 2018

Nintendo switch debugger for radare2

C 13 Updated Aug 12, 2018

Windows NT x64 syscall fuzzer

C 628 112 Updated Dec 5, 2025

Implementation trade-offs in using Intel Pin for instruction tracing of complex programs

C++ 15 3 Updated Oct 16, 2019

Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams

Python 5,734 1,277 Updated Dec 12, 2025
Python 153 22 Updated Dec 6, 2018

System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)

C 46 18 Updated Dec 1, 2017

Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins

C 134 20 Updated Jan 6, 2019

Security Evaluation of Dynamic Binary Instrumentation Engines

C 81 12 Updated Sep 1, 2018

A DBI tool to discover heap memory related bugs

C++ 125 27 Updated Jun 25, 2018

writings on anti-reverse engineering.

289 34 Updated Nov 13, 2021
C++ 42 14 Updated May 23, 2017
C 523 145 Updated Feb 22, 2020

pySMT: A library for SMT formulae manipulation and solving

Python 623 140 Updated Sep 5, 2025
Jupyter Notebook 297 184 Updated Mar 8, 2024

a Minecraft clone written in C++ and OpenGL that includes Minecraft textures, chunks, building, terrain, trees, water, inventories, and more!

C++ 96 10 Updated Apr 18, 2020

A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.

PowerShell 172 42 Updated Feb 19, 2025

LAVA: Large-scale Automated Vulnerability Addition

C++ 408 65 Updated Dec 21, 2025

Learning operating system development using Linux kernel and Raspberry Pi

C 13,715 1,333 Updated Mar 29, 2024

Lore makes machine learning approachable for Software Engineers and maintainable for Machine Learning Researchers

Python 1,547 133 Updated May 13, 2023

UAC bypass, Elevate, Persistence methods

Python 2,729 391 Updated Feb 13, 2023

radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability

C 93 25 Updated May 13, 2019

FPGA-based Nintendo Entertainment System Emulator

Verilog 269 65 Updated Jan 16, 2024

A fully implemented kernel exploit for the PS4 on 5.05FW

JavaScript 638 129 Updated Aug 5, 2019

A Chess AI that uses a minimax algorithm with alpha-beta pruning

Python 92 23 Updated May 8, 2022

A toy shogi AI

Python 23 4 Updated Aug 6, 2015

Deep Pink is a chess AI that learns to play chess using deep learning.

Python 829 158 Updated Feb 20, 2017

Ruby and Sinatra application downloading slides from slideshare.

Ruby 8 4 Updated Nov 20, 2013
Next