Skip to content
View servomekanism's full-sized avatar
🌾
On vacation
🌾
On vacation

Block or report servomekanism

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
11 stars written in Assembly
Clear filter

The original sources of MS-DOS 1.25, 2.0, and 4.0 for reference purposes

Assembly 31,725 4,547 Updated Apr 25, 2024

Collection of malware source code for a variety of platforms in an array of different programming languages.

Assembly 17,818 2,008 Updated Sep 10, 2025

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.

Assembly 13,208 1,204 Updated Feb 8, 2026

An introduction to ARM64 assembly on Apple Silicon Macs

Assembly 4,893 322 Updated Nov 19, 2025

AV/EDR evasion via direct system calls.

Assembly 1,985 274 Updated Jan 1, 2023

AV/EDR evasion via direct system calls.

Assembly 1,788 254 Updated Sep 3, 2022

Just another Windows Process Injection

Assembly 408 81 Updated Aug 7, 2020

Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used to demonstrate what polymorphic engines are.

Assembly 154 37 Updated Mar 11, 2023

Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection

Assembly 138 33 Updated May 27, 2025

Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection

Assembly 1 Updated Oct 10, 2024

AV/EDR evasion via direct system calls.

Assembly 1 Updated Mar 26, 2020