Lists (4)
Sort Name ascending (A-Z)
Stars
- All languages
- ASL
- Arduino
- Assembly
- Astro
- AutoIt
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- CoffeeScript
- Dart
- Dockerfile
- Elixir
- Emacs Lisp
- Go
- Groovy
- HCL
- HTML
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- MDX
- Makefile
- Markdown
- Nim
- Nunjucks
- Objective-C
- Objective-C++
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- Rich Text Format
- Ruby
- Rust
- SCSS
- SQL
- Shell
- Smali
- Svelte
- Swift
- TSQL
- Tcl
- TeX
- TypeScript
- VBA
- VBScript
- Vala
- Vim Script
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YARA
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Android real-time display control software
📚 Modern C++ Tutorial: C++11/14/17/20 On the Fly | https://changkun.de/modern-cpp/
Haptic input knob with software-defined endstops and virtual detents
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
🌱Light and powerful C++ web framework for highly scalable and resource-efficient web application. It's zero-dependency and easy-portable.
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Distributed LLM inference. Connect home devices into a powerful cluster to accelerate LLM inference. More devices means faster inference.
Wireless keystroke injection attack platform
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
High-level, multiplatform C++ network packet sniffing and crafting library.
Wifi & BLE driven passenger flow metering with cheap ESP32 boards
A Flipper Zero clone, but cheapest, DIY and simply Open Source, made with Arduino IDE
An Active Defense and EDR software to empower Blue Teams
Real-time audio streaming over the network.
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)
Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.
Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
2D Platformer Educational Game for Teaching Game Hacking - C++/cocos2d-x