10000 thecatontheceiling (Lyssa) / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View thecatontheceiling's full-sized avatar
💥
84 stalkers
💥
84 stalkers
  • random sewer

Organizations

@massgravel @team-mushroom @gravesoft

Block or report thecatontheceiling

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Devs... ffs! How much can you suck at porting games

C# 34 Updated Feb 25, 2025

Unity il2cpp reverse engineer

C# 7,693 1,540 Updated Aug 18, 2024

Convert ebooks to audiobooks with chapters and metadata using dynamic AI models and voice cloning. Supports 1,107+ languages!

Python 9,741 699 Updated May 17, 2025

A centralized resource for previously documented WDAC bypass techniques

555 75 Updated May 15, 2025

Universal No-CD patcher for games protected by Noviy Disk's custom DRM solution

Rust 4 1 Updated May 16, 2025

A flaming wreck of a minecraft mod about nuclear technology that is somehow still in development.

Java 530 344 Updated May 16, 2025

An in-game UI for exploring, debugging and modifying IL2CPP and Mono Unity games.

C# 456 24 Updated Apr 18, 2025

Documentation for the first 7 versions of DirectX and Direct3D

C 10 Updated Jan 16, 2025

This project does API hooking using hot patching and IAT patching. It is intended to be used for use as a submodule in other projects to reduce code redundancy.

C++ 10 4 Updated Mar 28, 2025

The project which restores halo 2 PC multiplayer online through the "Network" area, while also adding new features such as GunGame and more to come.

C 170 49 Updated May 17, 2025

IDA plugin to recover source code from panic information on rust

Python 15 1 Updated May 9, 2025

The PS5 Nor Modifier is an easy to use Windows based application to rewrite your PS5 NOR file. This can be useful if your NOR is corrupt, or if you have a disc edition console that needs to be conv…

C# 985 120 Updated May 12, 2025

An even funnier way to disable windows defender. (through WSC api)

C++ 1,181 113 Updated May 16, 2025

A decompilation of Rock Band 3 brought to you by a bunch of clever folks.

C++ 86 24 Updated May 14, 2025

Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy checks

C++ 50 1 Updated May 6, 2025
Rust 62 8 Updated Aug 24, 2022

Python implementation of the Kerberos authentication protocol.

Python 2 Updated Oct 6, 2023

Research-focused hypervisor offering advanced tools for debugging, virtual machine introspection, and automation.

Rust 20 2 Updated May 12, 2025

mega.nz downloader made in bash

Shell 2 Updated May 12, 2025

rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.

C++ 1,937 257 Updated May 15, 2025

Python script for creating photomosaic images

Python 555 168 Updated May 28, 2024

A debugger for Windows ARM64 (AARCH64), user-friendly for reverse engineers, malware analysts, malware developers, game hacking, operating system studies, and more.

C++ 56 9 Updated May 6, 2025

Low-latency machine code generation

C++ 4,149 528 Updated May 10, 2025

The LLVM Project is a collection of modular and reusable compiler and toolchain technologies.

LLVM 32,439 13,476 Updated May 18, 2025

Run x86-64 programs on RISC-V Linux

C++ 275 7 Updated May 18, 2025

IDA PRO auto-renaming plugin with tagging support

Python 708 91 Updated Sep 5, 2024

IDA Pro plugin that implements more user-friendly register and stack views

Python 678 59 Updated Dec 12, 2024
Python 178 22 Updated Apr 23, 2025

This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim opens the phishing link and instantly redirects them to the …

Go 129 17 Updated Apr 24, 2025
Next
0