Skip to content
View JohnTroony's full-sized avatar
🐙
multitasking
🐙
multitasking

Block or report JohnTroony

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
35 stars written in C
Clear filter

A free Windows-compatible Operating System

C 14,975 1,794 Updated Jan 22, 2025

Porting Windows Dynamic Link Libraries to Linux

C 4,356 380 Updated Apr 18, 2024

Wrangling Untrusted File Formats Safely

C 4,252 136 Updated Nov 27, 2024

Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do

C 3,494 468 Updated Jun 21, 2024

Simple (relatively) things allowing you to dig a bit deeper than usual.

C 3,278 535 Updated Jan 21, 2025

A Linux version of the ProcDump Sysinternals tool

C 2,977 310 Updated Jan 21, 2025

Dynamic Instrumentation Tool Platform

C 2,720 570 Updated Jan 21, 2025

Command line utility for inserting a dylib load command into a Mach-O binary

C 1,824 332 Updated Feb 26, 2024

tiny, portable SOCKS5 server with very moderate resource usage

C 1,629 278 Updated May 24, 2024

VMware Escape Exploit before VMware WorkStation 12.5.5

C 911 352 Updated Nov 7, 2023

A collection of vulnerable ARM binaries for practicing exploit development

C 902 169 Updated Nov 15, 2021

A C library for reading, creating, and modifying zip archives.

C 872 279 Updated Jan 20, 2025

This project contains pocs and exploits for vulneribilities I found (mostly)

C 760 211 Updated Mar 21, 2024

A Pwn2Own exploit chain

C 756 117 Updated Nov 8, 2018

Raw binary firmware analysis software

C 512 56 Updated Jun 6, 2024

KSOCKET provides a very basic example how to make a network connections in the Windows Driver by using WSK

C 483 130 Updated Sep 2, 2022

Realtek rtl8814au driver

C 431 131 Updated Jul 13, 2024

UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.

C 409 111 Updated Oct 31, 2018

rVMI - A New Paradigm For Full System Analysis

C 353 70 Updated Oct 4, 2017

Stealthy backdoor for Windows operating systems

C 275 45 Updated Feb 13, 2020

Utils

C 265 105 Updated Jan 11, 2016

Hardcore corruption of my execve() vulnerability in WSL

C 214 39 Updated Feb 2, 2018

Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999

C 212 50 Updated Nov 6, 2019

Minimal code to connect to a CEF debugger.

C 201 19 Updated Jun 10, 2020

Example showing how to use Frida for standalone injection of a custom payload

C 157 22 Updated May 26, 2020

Command line tool for scanning streams within office documents plus xor db attack

C 126 30 Updated Sep 23, 2023

Hacking the iPhone Baseband because we paid for it.

C 110 25 Updated Dec 30, 2018

powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices

C 109 33 Updated Mar 28, 2019
Next