- All languages
- ASP
- Assembly
- AutoIt
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- Dockerfile
- FreeBASIC
- Gherkin
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kaitai Struct
- Kotlin
- LLVM
- Lua
- MDX
- Makefile
- Markdown
- Max
- Nim
- OCaml
- Objective-C
- Objective-C++
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- Scala
- Shell
- Swift
- TeX
- TypeScript
- V
- VBA
- Verilog
- Vue
- YAML
- YARA
- Zig
Starred repositories
Virtualize macOS 12 and later on Apple Silicon, VirtualBuddy is a virtual machine GUI for macOS M1, M2, M3, M4
Docker container for JDownloader 2
DeviceFarmer / stf
Forked from openstf/stfControl and manage Android devices from your browser.
Next Generation of ShadowsocksX
E-Ink Display with a Raspberry Pi and a Web Interface to customize and update the display with various plugins
Simplest ultrasonic ANTISPY voice recording jammer based on ATTINY13 / ATTINY85/45/25 / ARDUINO with PAM8403 / TPA3116D2 module driving piezo ultrasonic transducers (and optionally AD8933 signal ge…
Userspace WireGuard® Implementation in Rust
Multi-format archive and compression library
Low-level unprivileged sandboxing tool used by Flatpak and similar projects
pretty simple libs that include basic stuff to read & write process memory
A simple, modern and easy to use memory hacking library
Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling without admin permissions or kernel drivers.
Python tool to check rootkits in Windows kernel
Bootkit for Windows Sandbox to disable DSE/PatchGuard.
Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.
绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook
ASM Bootkit that patches DSE at boot allowing to load unsigned drivers
PsSetCreateProcessNotifyRoutine bypass proof-of-concept for manual mapped drivers
Proof of concept on how to bypass some limitations of a manual mapped driver
Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executable pages. (VAD hide / NX bit swapping)