Pinned Repositories
Blazorise
Blazorise is a component library built on top of Blazor and CSS frameworks like Bootstrap, Bulma and Material.
brutedet
Generalized proof of concept tool which can be used for drop-in bruteforce protection when needed.
dawgmon
dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software
lookinsidethebox
misc-tools
Miscellaneous collection of simple standalone tools, hacks and patches.
pbscan
Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.
pt-utils
Collection of a base for pentest logging utilities which never went anywhere. Might still be useful for someone.
python-terminal-emulator
Simple proof of concept Python + PySide/Qt terminal emulator (too slow for serious usage)
trafficker
Code written for the Google Maps traffic analysis demo. See the demo video at https://www.youtube.com/watch?v=skQNwd9Jij4 or the whitepaper which can be found in doc/. Talks about this were given at 44Con and Ruxcon.
ulexecve
ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries ever having to touch storage. This is useful for red-teaming and anti-forensics purposes.
gvb84's Repositories
gvb84/pbscan
Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.
gvb84/python-terminal-emulator
Simple proof of concept Python + PySide/Qt terminal emulator (too slow for serious usage)
gvb84/brutedet
Generalized proof of concept tool which can be used for drop-in bruteforce protection when needed.
gvb84/trafficker
Code written for the Google Maps traffic analysis demo. See the demo video at https://www.youtube.com/watch?v=skQNwd9Jij4 or the whitepaper which can be found in doc/. Talks about this were given at 44Con and Ruxcon.
gvb84/dawgmon
dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software
gvb84/pt-utils
Collection of a base for pentest logging utilities which never went anywhere. Might still be useful for someone.
gvb84/Blazorise
Blazorise is a component library built on top of Blazor and CSS frameworks like Bootstrap, Bulma and Material.
gvb84/lookinsidethebox
gvb84/misc-tools
Miscellaneous collection of simple standalone tools, hacks and patches.
gvb84/ulexecve
ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries ever having to touch storage. This is useful for red-teaming and anti-forensics purposes.
gvb84/aiotuya
Library for LAN control of Tuya devices. Include provisioning.
gvb84/algorithms
From scratch algorithm implementations because I needed them for projects or wanted to learn about them by implementing them dirctly from the describing papers
gvb84/ApplicationInspector
A source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
gvb84/awstracer
AWS CLI Tracer - trace and replay sequences of aws cli commands
gvb84/blazor.radzen.com
Sample application showcasing the Radzen Blazor Components
gvb84/boopkit
Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access.
gvb84/Cvss.Net
A utility library to handle Common Vulnerability Scoring System (CVSS) v3 Vectors and calculate their scores.
gvb84/MatBlazor
Material Design components for Blazor and Razor Components
gvb84/mhmot-client
Met Het Mes Op Tafel Client
gvb84/minotaur
A pythonic, asynchronous, inotify interface
gvb84/pysap
pysap is an open source Python library that provides modules for crafting and sending packets using SAP's NI, Diag, Enqueue, Router, MS, SNC, IGS, RFC and HDB protocols.
gvb84/RankPL
A qualitative probabilistic programming language based on ranking theory
gvb84/symlink-secure-boot-vm
VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/defeating-secure-boot-with-symlink-attacks.html
gvb84/ttyjack
proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX
gvb84/vimconfig
just my personal vim config