Skip to content
View enderax's full-sized avatar

Block or report enderax

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
74 stars written in C
Clear filter

A new bootable USB solution.

C 64,274 4,149 Updated Jan 22, 2025

UNIX-like reverse engineering framework and command-line toolset

C 21,036 3,034 Updated Jan 24, 2025

A little tool to play with Windows security

C 19,711 3,780 Updated Jul 5, 2024

Flipper Zero Unleashed Firmware

C 18,356 1,504 Updated Jan 23, 2025

Playground (and dump) of stuff I make or modify for the Flipper Zero

C 14,552 3,368 Updated Jan 23, 2025

A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals…

C 11,341 1,422 Updated Jan 24, 2025

Small and highly portable detection tests based on MITRE's ATT&CK.

C 10,079 2,845 Updated Jan 22, 2025

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…

C 9,642 2,288 Updated Mar 17, 2024

A repository for learning various heap exploitation techniques.

C 7,458 1,162 Updated Nov 27, 2024

Defeating Windows User Account Control

C 6,525 1,331 Updated Jul 22, 2024

Course materials for Modern Binary Exploitation by RPISEC

C 5,570 893 Updated Dec 9, 2021

Direct Memory Access (DMA) Attack Software

C 5,259 768 Updated Jan 19, 2025

JSON output from a shell

C 4,699 158 Updated Nov 10, 2024

This repository contains several applications, demonstrating the Meltdown bug.

C 4,122 523 Updated May 30, 2022

A tool to dump the login password from the current linux user

C 3,877 638 Updated May 17, 2023

MemProcFS

C 3,324 413 Updated Jan 19, 2025

Simple (relatively) things allowing you to dig a bit deeper than usual.

C 3,281 536 Updated Jan 21, 2025

Function graph tracer for C/C++/Rust/Python

C 3,110 478 Updated Jan 20, 2025

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

C 2,809 778 Updated Sep 3, 2022

LKM Linux rootkit

C 2,639 581 Updated Mar 7, 2021

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

C 2,239 315 Updated Sep 22, 2024

WiFi arsenal

C 1,954 410 Updated Jul 6, 2020

FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX

C 1,662 201 Updated Jun 21, 2024

Post Exploitation Collection

C 1,556 358 Updated May 1, 2020

Linux Binary Exploitation

C 1,316 211 Updated Jun 15, 2021

Zero-Day Code Injection and Persistence Technique

C 1,219 414 Updated Aug 24, 2022

PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)

C 1,066 306 Updated May 4, 2023

Another Windows Local Privilege Escalation from Service Account to System

C 1,062 127 Updated Jan 9, 2021
Next