Skip to content
View loossy's full-sized avatar

Block or report loossy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Helping Ethical Hackers use LLMs in 50 Lines of Code or less..

Python 472 59 Updated Dec 15, 2024

A True Instrumentable Binary Emulation Framework

Python 5,209 747 Updated Nov 25, 2024
Python 1 Updated Nov 9, 2024

A few basic bytecode interpreters used as example code in a series of articles

C 120 6 Updated Nov 18, 2024

Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.

C++ 3,569 540 Updated Dec 12, 2024

Bindings for Microsoft WinDBG TTD

C++ 216 31 Updated Aug 5, 2023

Function signature matching and signature generation plugin for Binary Ninja

Python 67 11 Updated Sep 10, 2024

Flare-On 11

HTML 1 Updated Oct 25, 2024

IDA plugin for UEFI firmware analysis and reverse engineering automation

C++ 921 108 Updated Dec 7, 2024

EDK II

C 4,719 2,558 Updated Dec 16, 2024

A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl

C++ 1,129 183 Updated Dec 4, 2024

Helper scripts for analyzing NativeAOT compiled .NET binaries with Ghidra

Java 62 4 Updated Nov 16, 2023

My ongoing premier on reversing Swift

C 66 12 Updated Dec 11, 2024

Swift Apps Reverse Engineering reading book

138 14 Updated Jun 8, 2017

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 59,262 24,006 Updated Dec 16, 2024

Simple HS256, HS384 & HS512 JWT token brute force cracker.

JavaScript 1,049 165 Updated Jul 13, 2024

Soot - A Java optimization framework

Java 2,899 712 Updated Dec 14, 2024

FlowDroid Static Data Flow Tracker

Java 1,074 300 Updated Dec 9, 2024

A step-by-step tutorial for Soot (a Java static analysis framework)

Java 430 176 Updated Dec 23, 2022

Facebook AI Research Sequence-to-Sequence Toolkit written in Python.

Python 30,676 6,425 Updated Oct 18, 2024

Code for our paper "Modelobfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems" that has been published by ISSTA'23

C++ 15 3 Updated May 18, 2024

⚠️ malware development

C 471 57 Updated May 27, 2024

Primary Git Repository for the Zephyr Project. Zephyr is a new generation, scalable, optimized, secure RTOS for multiple hardware architectures.

C 11,076 6,749 Updated Dec 16, 2024

Universal and Transferable Attacks on Aligned Language Models

Python 3,510 484 Updated Aug 2, 2024

Win32 and Kernel abusing techniques for pentesters

C++ 928 138 Updated Sep 3, 2023

拼多多apk内嵌提权代码,及动态下发dex分析

63 29 Updated Mar 10, 2023

Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

C++ 11,215 1,695 Updated Dec 16, 2024

Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.

C++ 67 18 Updated Nov 6, 2021

Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2

C++ 287 44 Updated Jul 15, 2023

A summary of 200+ CTF blockchain challenges

Solidity 862 73 Updated Nov 9, 2024
Next