Skip to content
View zingotaku's full-sized avatar

Block or report zingotaku

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool

C++ 278 38 Updated Nov 20, 2025

Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package. Windows ONLY.

Go 824 87 Updated Dec 10, 2025

Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.

C++ 273 30 Updated Dec 10, 2025

Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.

C++ 67 6 Updated Nov 15, 2025

Raigeki is a Rust-based shellcode loader that writes memory via APCs using NtQueueApcThread and RtlFillMemory.

Rust 8 1 Updated Jul 1, 2025

Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antivirus. Built in Rust.

Rust 473 49 Updated Nov 29, 2025

bypassing intel txt's tboot integrity checks via coreboot shim

C 83 4 Updated Mar 15, 2025

Easy 802.1Q VLAN Hopping

Shell 385 98 Updated Feb 24, 2016

A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs

Rust 335 43 Updated Jun 23, 2025

Collection of codes focused on Linux rootkits

C 190 51 Updated Oct 22, 2025

Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets

Python 125 12 Updated Dec 29, 2024

A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…

C++ 587 86 Updated Jun 12, 2024

An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.

C++ 312 44 Updated Oct 18, 2018

Multilayered AV/EDR Evasion Framework

C++ 865 138 Updated Sep 6, 2025

DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely

C++ 379 53 Updated Dec 13, 2024

A collection of various vulnerable (mostly physical memory exposing) drivers.

PowerShell 430 79 Updated Jun 15, 2022

See it live at HacktheHeap.io now!

C 8 Updated Aug 3, 2022

A migration for the page table entry based side-channel attack agains SGX enclaves.

C 19 1 Updated Feb 10, 2025

A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager

C 693 120 Updated Mar 26, 2019

Username enumeration and password spraying tool aimed at Microsoft O365.

Python 962 115 Updated Nov 6, 2024

Source code of a multiple series of tutorials about the hypervisor. Available at: https://rayanfam.com/tutorials

C 2,484 343 Updated Aug 17, 2025

Allows safer access to model specific registers (MSRs)

C 95 28 Updated Sep 17, 2025

Small toolkit for extracting information and dumping sensitive strings from Windows processes

C 115 14 Updated Jul 17, 2024

This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.

PowerShell 91 19 Updated Apr 27, 2025

Explore Kernel Objects on Windows

C++ 241 42 Updated Apr 4, 2025

The Browser Exploitation Framework Project

JavaScript 10,646 2,339 Updated Dec 30, 2025

A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.

C++ 443 74 Updated Jul 8, 2024
Next