Skip to content
View hartescout's full-sized avatar
🤘
🤘

Organizations

@KeyCroc-Amateur-Hour

Block or report hartescout

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

13 stars written in C
Clear filter

Linux kernel source tree

C 211,233 59,518 Updated Dec 18, 2025

Playground (and dump) of stuff I make or modify for the Flipper Zero

C 16,332 3,707 Updated Dec 15, 2025

This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.

C 4,291 506 Updated Dec 18, 2025

Simple (relatively) things allowing you to dig a bit deeper than usual.

C 3,425 553 Updated Oct 20, 2025

Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).

C 2,282 284 Updated Oct 31, 2025

Vulkan Quake port based on QuakeSpasm

C 2,086 254 Updated Dec 19, 2025

Sysmon for Linux

C 2,042 209 Updated Jul 3, 2025

A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

C 1,391 268 Updated Nov 22, 2023

Research code & papers from members of vx-underground.

C 1,332 252 Updated Dec 7, 2021

Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file

C 675 122 Updated Mar 11, 2024

My implementation of enSilo's Process Doppelganging (PE injection technique)

C 635 120 Updated Aug 30, 2022

source code from idsoftware FTP

C 71 32 Updated Oct 9, 2011

This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles

C 48 6 Updated Jun 21, 2022