Skip to content
View guchinoma's full-sized avatar

Block or report guchinoma

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Some exploits, which I’ve created during my OSCE preparation.

Python 83 36 Updated Jul 7, 2018

Code Stealth Evaluation via Machine Learning

C 11 Updated Jun 30, 2018

Nintendo switch debugger for radare2

C 13 Updated Aug 12, 2018

Windows NT x64 syscall fuzzer

C 624 112 Updated Jun 29, 2025

Implementation trade-offs in using Intel Pin for instruction tracing of complex programs

C++ 15 3 Updated Oct 16, 2019

Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams

Python 5,628 1,261 Updated Oct 29, 2025
Python 152 22 Updated Dec 6, 2018

System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)

C 46 18 Updated Dec 1, 2017

Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins

C 134 20 Updated Jan 6, 2019

Security Evaluation of Dynamic Binary Instrumentation Engines

C 80 12 Updated Sep 1, 2018

A DBI tool to discover heap memory related bugs

C++ 125 27 Updated Jun 25, 2018

writings on anti-reverse engineering.

286 35 Updated Nov 13, 2021
C++ 42 14 Updated May 23, 2017
C 523 145 Updated Feb 22, 2020

pySMT: A library for SMT formulae manipulation and solving

Python 619 140 Updated Sep 5, 2025
Jupyter Notebook 296 184 Updated Mar 8, 2024

a Minecraft clone written in C++ and OpenGL that includes Minecraft textures, chunks, building, terrain, trees, water, inventories, and more!

C++ 96 10 Updated Apr 18, 2020

A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.

PowerShell 172 42 Updated Feb 19, 2025

LAVA: Large-scale Automated Vulnerability Addition

C++ 407 65 Updated Oct 17, 2025

Learning operating system development using Linux kernel and Raspberry Pi

C 13,643 1,335 Updated Mar 29, 2024

Lore makes machine learning approachable for Software Engineers and maintainable for Machine Learning Researchers

Python 1,547 134 Updated May 13, 2023

UAC bypass, Elevate, Persistence methods

Python 2,715 388 Updated Feb 13, 2023

radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability

C 94 25 Updated May 13, 2019

FPGA-based Nintendo Entertainment System Emulator

Verilog 268 66 Updated Jan 16, 2024

A fully implemented kernel exploit for the PS4 on 5.05FW

JavaScript 634 130 Updated Aug 5, 2019

A Chess AI that uses a minimax algorithm with alpha-beta pruning

Python 92 23 Updated May 8, 2022

A toy shogi AI

Python 23 4 Updated Aug 6, 2015

Deep Pink is a chess AI that learns to play chess using deep learning.

Python 824 158 Updated Feb 20, 2017

Ruby and Sinatra application downloading slides from slideshare.

Ruby 8 4 Updated Nov 20, 2013
Next