Skip to content
View diego-tella's full-sized avatar

Block or report diego-tella

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

C 3,724 651 Updated Oct 23, 2024

A port of Doom (1993) that runs inside a PDF file

C 2,615 87 Updated Jan 18, 2025

A repository for learning various heap exploitation techniques.

C 7,470 1,164 Updated Jan 28, 2025

💔 Hearbleed exploit to retrieve sensitive information CVE-2014-0160 💔

Python 82 42 Updated Feb 20, 2021

Malware to gain persistence on a victims machine.

C 19 4 Updated Feb 12, 2023

LibZeroEvil & the Research Rootkit project.

C 594 196 Updated Dec 1, 2021

A Tutorial how to get started with Linux Kernel Modules and Linux Drivers.

C 870 237 Updated Jul 15, 2024

Exploitation of process killer drivers

C 195 24 Updated Oct 17, 2023

HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

C 2,545 540 Updated Jan 13, 2025

Python utility for parsing Xamarin AssemblyStore blob files

Python 159 33 Updated May 6, 2024

PoC for CVE-2024-48990

Python 97 19 Updated Nov 20, 2024

This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…

Python 4,028 560 Updated Jan 28, 2025

Research about the Zend Engine

PHP 262 25 Updated Jul 5, 2020

Load a statically-linked ELF binary(x86 architecture) without the execve syscall.

C 37 7 Updated Sep 20, 2020

curiosity got me here

C 36 1 Updated Jul 27, 2024

www.eudyptula-challenge.org

C 1,111 347 Updated May 31, 2014

Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.

Python 89 13 Updated Aug 26, 2022

Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…

C++ 431 71 Updated Nov 19, 2024

A Compiler Writing Journey

C 11,370 1,064 Updated Jul 30, 2024

⚠️」Performing a BYOVD on the truesight.sys driver

C++ 30 4 Updated Dec 7, 2024

Connect like there is no firewall. Securely.

C 1,602 136 Updated Dec 13, 2024

🎯 An aimbot that uses Yolov5 and PyTorch to play CS:GO

Python 16 3 Updated Feb 7, 2023

JWT brute force cracker written in C

C 2,426 263 Updated Jun 2, 2023

Tool for performing SNMP scanning accross wide swaths of IP ranges

Perl 2 Updated Mar 18, 2014

A malicious LDAP server for JNDI injection attacks

Java 1,021 223 Updated Sep 28, 2023

Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.

Python 146 29 Updated Jan 4, 2024

Proof-of-Concept for CVE-2024-8353

Python 11 2 Updated Oct 1, 2024
Python 228 55 Updated Sep 27, 2024

Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)

C 1,044 320 Updated Aug 2, 2019
Next