Lists (26)
Sort Name ascending (A-Z)
🧠AI
🎫BinMagic
🎁book
🧨bypass
anti-vir bypasssssssssss🔍code audit
🔐Cryptography
🛠️Dev-Compilers
🏗️Dev-Frameworks
🛠️Dev-Gadget
🛡️Exploits
🍔ExpResearch
for exploit code learnning🕵️♂️Forensics
✨fuzz
🕶hack
🧪kernel
📕paper
collecting fuzz paper's code🔍Penetration Testing
🎯project
learn how to code🎈redteam
🧪research
🔄Reverse Engineering
🛠️Security Tools
🧑💻Social Engineering
🛠useful gadget
🔪ww3
🍉吃瓜
🍉🍉🍉Stars
The new Windows Terminal and the original Windows console host, all in the same place!
Protocol Buffers - Google's data interchange format
Dear ImGui: Bloat-free Graphical User interface for C++ with minimal dependencies
The C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#)
Seamless operability between C++11 and Python
A high-performance, zero-overhead, extensible Python compiler using LLVM
The Next Generation of Anti-Rookit(ARK) tool for Windows.
A C++ library for interacting with JSON.
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.
The Windows App SDK empowers all Windows desktop apps with modern Windows UI, APIs, and platform features, including back-compat support, shipped via NuGet.
A lightweight library for portable low-level GPU computation using WebGPU.
新一代SKRoot,挑战全网root检测手段,跟面具完全不同思路,摆脱面具被检测的弱点,完美隐藏root功能,全程不需要暂停SELinux,实现真正的SELinux 0%触碰,通用性强,通杀所有内核,不需要内核源码,直接patch内核,兼容安卓APP直接JNI调用,稳定、流畅、不闪退。
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory
Disable PatchGuard and Driver Signature Enforcement at boot time
Nidhogg is an all-in-one simple to use windows kernel rootkit.
Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-m…
Monitoring and controlling kernel API calls with stealth hook using EPT
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.