Skip to content
View hartescout's full-sized avatar
🤘
🤘

Organizations

@KeyCroc-Amateur-Hour

Block or report hartescout

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

13 results for source starred repositories written in C
Clear filter

Linux kernel source tree

C 216,296 60,306 Updated Feb 4, 2026

Playground (and dump) of stuff I make or modify for the Flipper Zero

C 16,575 3,757 Updated Jan 4, 2026

This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.

C 4,345 515 Updated Feb 4, 2026

Simple (relatively) things allowing you to dig a bit deeper than usual.

C 3,457 560 Updated Feb 3, 2026

Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).

C 2,307 285 Updated Oct 31, 2025

Vulkan Quake port based on QuakeSpasm

C 2,133 259 Updated Feb 4, 2026

Sysmon for Linux

C 2,058 212 Updated Feb 4, 2026

A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

C 1,397 268 Updated Nov 22, 2023

Research code & papers from members of vx-underground.

C 1,351 257 Updated Dec 7, 2021

Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file

C 681 123 Updated Mar 11, 2024

My implementation of enSilo's Process Doppelganging (PE injection technique)

C 637 121 Updated Aug 30, 2022

source code from idsoftware FTP

C 72 33 Updated Oct 9, 2011

This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles

C 48 6 Updated Jun 21, 2022