- (ノ°∀°)ノ⌒・*:.。. .。.:*・゜゚・*☆
- https://ppn.snovvcra.sh
- @snovvcrash
Stars
- All languages
- Assembly
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Classic ASP
- D
- Dockerfile
- Go
- HCL
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Makefile
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- Pony
- PowerShell
- Python
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Standard ML
- Swift
- TypeScript
- VBA
- VBScript
- Vala
- Vim Script
- Visual Basic .NET
- Vue
- YARA
The new Windows Terminal and the original Windows console host, all in the same place!
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
GoogleTest - Google Testing and Mocking Framework
KeePassXC is a cross-platform community-driven port of the Windows application “KeePass Password Safe”.
SQL powered operating system instrumentation, monitoring, and analytics.
Free and Open Source Reverse Engineering Platform powered by rizin
Enabling the Windows Subsystem for Linux to include support for Wayland and X server related scenarios
Amnezia VPN Client (Desktop+Mobile)
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
A brief computer graphics / rendering course
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Command Line Interactive and Scriptable Application to access MEGA
Alternative Shellcode Execution Via Callbacks
Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platform
Total Registry - enhanced Registry editor/viewer
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
CPU, RAM, and load monitor for use with tmux
Move windows using hotkeys or the system menu
Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes
Extracts passwords from a KeePass 2.x database, directly from memory.
Tool to bypass LSA Protection (aka Protected Process Light)