Skip to content
View senko37's full-sized avatar
💊
I may be slow
💊
I may be slow
  • Samaraland
  • 22:30 (UTC +04:00)

Highlights

  • Pro

Block or report senko37

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

Python 41,384 4,375 Updated Nov 24, 2025

Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.

C++ 1,485 247 Updated Nov 21, 2025

An strace-like program for the Windows 'native' API

C++ 285 47 Updated Nov 23, 2025

x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration

C++ 366 69 Updated Jul 6, 2022

Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm and even draw rectangles for esp. This was made to hack video…

C++ 194 24 Updated Dec 16, 2022

"Randar" is an exploit for Minecraft which uses LLL lattice reduction to crack the internal state of an incorrectly reused java.util.Random in the Minecraft server, then works backwards from that t…

Shell 892 22 Updated Apr 20, 2024

Source code for Oracle VirtualBox

C 821 89 Updated Nov 25, 2025

X86 Packer with Portable Executable compatibility.

C++ 67 16 Updated Nov 19, 2025

An even funnier way to disable windows defender. (through WSC api)

C++ 3,033 271 Updated Nov 23, 2025

UEFI Shell binary images, generated from EDK2 stable

512 60 Updated Nov 21, 2025

Official repo for Memtest86+

C 1,427 104 Updated Nov 29, 2025

CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit

HTML 821 171 Updated Oct 11, 2023

Unofficial Common Log File System (CLFS) Documentation

185 21 Updated Oct 5, 2021

Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.

C 310 63 Updated Apr 16, 2024

This tool will allow you to spoof the return addresses of your functions as well as system functions.

C++ 520 85 Updated Nov 12, 2022

Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks

Python 399 56 Updated Jul 4, 2025

efi headers

C 62 10 Updated Mar 28, 2025

Complete list of LPE exploits for Windows (starting from 2023)

C 842 119 Updated Nov 25, 2025

Diaphora, the most advanced Free and Open Source program diffing tool.

Python 4,109 399 Updated Nov 24, 2024

Leveraging CVEs as North Stars in vulnerability discovery and comprehension.

HTML 70 7 Updated Apr 2, 2024

This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…

Python 4,315 572 Updated Nov 22, 2025

An index of Windows binaries, including download links for executables such as exe, dll and sys files

Python 730 75 Updated Nov 29, 2025

Leveraging patch diffing to discover new vulnerabilities

136 15 Updated Oct 21, 2024

A repository for learning various heap exploitation techniques.

C 8,262 1,233 Updated Oct 29, 2025

Kernel Level NMI Callback Blocker

C++ 135 16 Updated Sep 27, 2025

EFI bootkit for loading unsigned drivers

C++ 21 2 Updated Jun 28, 2024
Next