- 127.0.0.1/Australia
- @aekrs1
Highlights
- Pro
Lists (1)
Sort Name ascending (A-Z)
- All languages
- ASP
- Arduino
- Assembly
- AutoHotkey
- AutoIt
- BASIC
- Batchfile
- Boo
- C
- C#
- C++
- CMake
- CSS
- CoffeeScript
- Common Lisp
- Crystal
- Dart
- Dockerfile
- EJS
- Erlang
- F#
- Go
- HTML
- Haskell
- Inno Setup
- Java
- JavaScript
- Kaitai Struct
- Kotlin
- LLVM
- Logos
- Lua
- MATLAB
- Makefile
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QMake
- Rebol
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smali
- Smarty
- Svelte
- Swift
- TeX
- TypeScript
- VBA
- VBScript
- VHDL
- Visual Basic
- Visual Basic .NET
- Visual Basic 6.0
- Vue
- XSLT
- YARA
- Zig
Starred repositories
A reconnaissance framework for researching and investigating Telegram.
A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
deweaver3rd / unshackle
Forked from Fadi002/unshackleOpen-source tool to bypass windows and linux passwords from bootable usb
Just a mods repo for https://github.com/Fadi002/xworm-3.1-modded-by-mrpepe
Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
This tool generates a malicious AVI file embedding a forged HLS playlist and AES-encrypted payloads crafted to manipulate the behavior of vulnerable FFmpeg instances.
Chainski / VMAware
Forked from kernelwernel/VMAwareVM detection library and tool
howmp / donut_ollvm
Forked from TheWover/donutGenerates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread
The free and privacy-friendly screen recorder with no limits 🎥
Makes IDA (most versions) to crash upon opening it.
Generate pretty character sheets from text files.
Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.
Packer compressing .net assemblies, (ab)using the PE format for data storage
Demonstrates the DLL Hollowing technique implemented in the Rust programming language.
Proof of concept & details for CVE-2025-21298
This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).
exploit for CVE-2025-27533, a Denial of Service (DoS) vulnerability in Apache ActiveMQ