Skip to content
View lxwAsm's full-sized avatar

Block or report lxwAsm

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
  • iMonitor Public

    Forked from wecooperate/iMonitor

    iMonitor(冰镜 - 终端行为分析系统)

    C++ GNU Affero General Public License v3.0 Updated Nov 20, 2024
  • kdmapper Public

    Forked from TheCruZ/kdmapper

    KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory

    C++ MIT License Updated Oct 7, 2024
  • CppBeacon Public

    CobalStrike Beacon by CPP

    C++ 2 Updated Jan 23, 2024
  • User Mode Windows Rootkit

    C++ Updated Jan 5, 2024
  • C++ 2 Updated Aug 7, 2023
  • Nidhogg Public

    Forked from Idov31/Nidhogg

    Nidhogg is an all-in-one simple to use rootkit for red teams.

    C++ BSD 2-Clause "Simplified" License Updated Mar 7, 2023
  • BypassAV Public

    Forked from matro7sh/BypassAV

    This map lists the essential techniques to bypass anti-virus and EDR

    Updated Feb 6, 2023
  • HTML Updated Sep 30, 2022
  • Process Hollowing in C++ (x86 / x64) - Process PE image replacement

    C++ GNU General Public License v3.0 Updated May 24, 2022
  • PEzor Public

    Forked from phra/PEzor

    Open-Source Shellcode & PE Packer

    C GNU General Public License v3.0 Updated Mar 29, 2022
  • Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging

    C MIT License Updated Jan 24, 2022
  • herpaderping Public

    Forked from jxy-s/herpaderping

    Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.

    C++ MIT License Updated Jan 10, 2022
  • sRDI Public

    Forked from monoxgas/sRDI

    Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode

    PowerShell Other Updated Nov 17, 2021
  • Stealing Signatures and Making One Invalid Signature at a Time

    Python BSD 3-Clause "New" or "Revised" License Updated Aug 11, 2021
  • kinject Public

    Forked from w1u0u1/kinject

    Kernel shellcode injector

    C Updated Mar 23, 2021
  • iox Public

    Forked from EddieIvan01/iox

    Tool for port forwarding & intranet proxy

    Go MIT License Updated Mar 14, 2021
  • myprojects Public

    some java,c++,python small project for study

    Python 7 5 Updated Mar 10, 2021
  • geacon Public

    Forked from darkr4y/geacon

    Practice Go programming and implement CobaltStrike's Beacon in Go

    Go Updated Oct 2, 2020
  • asterism Public

    Forked from sosopop/asterism

    基于libuv开发的内网穿透反向代理(Intranet penetration reverse proxy)

    C Updated Jul 28, 2020
  • requests Public

    C++ Requests Lightly network request library

    C++ 57 11 Updated Jul 4, 2020
  • WinFtp Public

    a lightly Windows Ftp Library for C++11

    C++ 5 3 Updated Jul 4, 2020
  • CTF Public

    some collecte ctf exercises including re,misc

    C++ 2 Updated Jun 28, 2020
  • Athena Public

    Forked from tomcarver16/Athena

    An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/master/UrbanBishop)

    C++ 1 Updated Jun 17, 2020
  • Learn Python 3 Sample Code

    GNU General Public License v2.0 Updated May 7, 2020
  • sogo Public

    Forked from arloor/sogo

    http流量伪装的socks5代理

    Go Updated Mar 14, 2020
  • rawsocket Public

    重庆邮电大学实验课项目

    C++ 2 Updated Jan 8, 2020
  • xmrig Public

    Forked from xmrig/xmrig

    RandomX, CryptoNight and Argon2 CPU miner

    C++ GNU General Public License v3.0 Updated Dec 14, 2019
  • moved to: https://github.com/alphaSeclab/awesome-reverse-engineering

    Updated Nov 25, 2019
  • This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.

    Updated Aug 26, 2019
  • Simple obfuscation tool

    C# MIT License Updated Aug 17, 2019