Stars
Git Source Code Mirror - This is a publish-only repository but pull requests can be turned into patches to the mailing list via GitGitGadget (https://gitgitgadget.github.io/). Please follow Documen…
A little tool to play with Windows security
Official QEMU mirror. Please see https://www.qemu.org/contribute/ for how to submit changes to QEMU. Pull Requests are ignored. Please only use release tarballs from the QEMU website.
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
A repository for learning various heap exploitation techniques.
Porting Windows Dynamic Link Libraries to Linux
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
Memory Debugger for Windows, Linux, Mac, and Android
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja disassemblers.
Windows tool for dumping malware PE files from memory back to disk for analysis.
My proof-of-concept exploits for the Linux kernel
CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0
Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)