Stars
System Call Integrity Layer - experimental security research
This repo contains PoCs for vulnerable Windows drivers.
Lateral Movement via the .NET Profiler
Translate virtual addresses to physical addresses from usermode.
"Bypassing" HVCI via donor PFN swaps to modify read-only code pages. Call chained kernel functions (kCET and SLAT support), modify read-only code pages, and more.
Parsing gigabytes of JSON per second : used by Facebook/Meta Velox, the Node.js runtime, ClickHouse, WatermelonDB, Apache Doris, Milvus, StarRocks
A collection of daily coding challenges designed to help you master idiomatic Go through deliberate, repetitive practice.
Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty
Robust evasion attacks against neural network to find adversarial examples
🤖 A minimal and customizable Docker image running the Android emulator as a service.
A hardware-aware guide to data structures for system software engineers.
A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack
A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+SID), PKINIT authentication, and NT hash extraction via UnPAC…
JA4+ is a suite of network fingerprinting standards
This tool reveals hidden desktops and investigate processes/threads utilizing hidden desktops
SoftICE-like kernel debugger for Windows 11
Packer/Protector for x86-64 ELF binaries on Linux
Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan in-memory .NET assembly loads. This tool unhooks that functi…
Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by surgically patching SeCiCallbacks via native subsystem. Inclu…
