Lists (12)
Sort Name ascending (A-Z)
Cicada 3301
Collections, scripts, assets of cicada 3301crypt
Everything related to cryptographyCTF's
ctf writeupsFuzzing
Tools / scripts for Failing built-in code assertionsHPC
Supercomputer (High Performance Computing)NDN
Named Data NetworkingPocs
cve's, security researches, morepwn
pwncollege, escalation privileges & moreQuantum
quantum computing algorithmsreverse-engine
Cyber-arsenal scripts, tools, etc for reverse engineeringScience
genetic algorithms, training machine & deep learning algorithms and moreUNIX & UNIX-LIKE
Curiosities of Linux Kernel, Hurd, BSD, POSIX, etc- All languages
- Assembly
- C
- C++
- CMake
- CSS
- Clojure
- Cython
- D
- Dockerfile
- Fortran
- GDB
- Go
- Groovy
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- LLVM
- Lua
- M4
- Makefile
- Mathematica
- Max
- Nextflow
- OCaml
- Objective-C
- OpenSCAD
- PHP
- Prolog
- Python
- Ruby
- Rust
- Sage
- Sail
- Scala
- Shell
- SmPL
- Solidity
- Swift
- SystemVerilog
- Tcl
- TeX
- TypeScript
- V
- VHDL
- Verilog
- Vue
- Wikitext
- YAML
- YARA
- Zeek
- Zig
Starred repositories
A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints
Demo showing Claude Opus does not find CVE-2023-0266
Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'
Fair-code workflow automation platform with native AI capabilities. Combine visual building with custom code, self-host or cloud, 400+ integrations.
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations
Hardware-breakpoint-based hooking and patching library for iOS.
Strange and odd python snippets explained
Template-Driven AV/EDR Evasion Framework
PoC Implementation of a fully dynamic call stack spoofer
A fast usermode x86 and x86-64 emulator for Arm64 Linux
A Mini-Whip clone capable of lower supply voltages or battery powered
模拟一个存在漏洞的JavaScript 运行环境,用来学习浏览器漏洞原理和练习如何编写Shellcode (a JavaScript Execute Envirment which study browser vuln and how to write Shellcode ) ..
This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后渗透后门程序,适合在已经攻陷的内网中做下一步的网络信息扫描..
A Reproduction of GDM's Nested Learning Paper