Skip to content
View hexwaxwing's full-sized avatar

Block or report hexwaxwing

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
30 results for source starred repositories written in C
Clear filter

UNIX-like reverse engineering framework and command-line toolset

C 22,555 3,133 Updated Nov 6, 2025

A little tool to play with Windows security

C 20,957 3,988 Updated May 11, 2025

The pattern matching swiss knife

C 9,188 1,532 Updated Oct 30, 2025

A repository for learning various heap exploitation techniques.

C 8,171 1,229 Updated Oct 29, 2025

A command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.

C 7,707 301 Updated Nov 5, 2024

Course materials for Modern Binary Exploitation by RPISEC

C 5,869 908 Updated Dec 9, 2021

SL(1): Cure your bad habit of mistyping

C 3,171 442 Updated Jun 11, 2024

A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.

C 2,255 419 Updated Nov 4, 2025

Library for the analysis of networks

C 1,896 429 Updated Nov 2, 2025

FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX

C 1,799 208 Updated Oct 21, 2025

Wiki-like CTF write-ups repository, maintained by the community. 2016

C 1,631 498 Updated Oct 2, 2018

My proof-of-concept exploits for the Linux kernel

C 1,524 366 Updated Sep 11, 2025

Quiet for Android - TCP over sound

C 1,432 125 Updated Jun 22, 2021

This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.

C 1,267 121 Updated Oct 7, 2022

Vulnerable server used for learning software exploitation

C 1,083 262 Updated Oct 9, 2020

A collection of vulnerable ARM binaries for practicing exploit development

C 921 169 Updated Nov 15, 2021

Firmware patches for the TYT-MD380 handheld radio.

C 834 251 Updated Dec 28, 2024

DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidSco…

C 829 166 Updated Nov 19, 2024

Tool for extracting information from newly spawned processes

C 769 112 Updated May 11, 2025

A collection of source code for various botnets.

C 562 139 Updated Oct 9, 2019

Send arbitrary IEEE 802.11 frames with Espressif's ESP32

C 541 82 Updated Jan 24, 2022

image4 vfs

C 358 103 Updated Feb 11, 2023

Exception-oriented exploitation by Ian Beer

C 187 76 Updated Mar 1, 2018

drive some car across the moon

C 97 18 Updated Jul 6, 2025

Malware Analysis, Threat Intelligence and Reverse Engineering: LABS

C 82 17 Updated Dec 24, 2020

Exploitation on different architectures (x86, x64, arm, mips, avr)

C 36 8 Updated Oct 23, 2018

dump contents of cmd.exe console window buffer to a file

C 11 5 Updated Apr 16, 2019

Challenges from Def Con 612's 1-day event 9/3/13

C 4 Updated Nov 10, 2014