nicelnicel's Stars
GrowingGit/GitHub-Chinese-Top-Charts
:cn: GitHub中文排行榜,各语言分设「软件 | 资料」榜单,精准定位中文好项目。各取所需,高效学习。
Pythagora-io/gpt-pilot
The first real AI developer
microsoft/winget-pkgs
The Microsoft community Windows Package Manager manifest repository
mangos/MaNGOS
This is the master Information repository for MaNGOS
trickster0/OffensiveRust
Rust Weaponization for Red Team Engagements.
ionescu007/SimpleVisor
SimpleVisor is a simple, portable, Intel VT-x hypervisor with two specific goals: using the least amount of assembly code (10 lines), and having the smallest amount of VMX-related code to support dynamic hyperjacking and unhyperjacking (that is, virtualizing the host state from within the host). It works on Windows and UEFI.
LordNoteworthy/cpu-internals
Intel / AMD CPU Internals
MUnique/OpenMU
This project aims to create an easy to use, extendable and customizable server for a MMORPG called "MU Online".
Cr4sh/s6_pcie_microblaze
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
mactec0/Kernelmode-manual-mapping-through-IAT
Manual mapping without creating any threads, with rw only access
strivexjun/DriverInjectDll
Using Driver Global Injection dll, it can hide DLL modules
donnaskiez/ac
kernel mode anti cheat
fjqisba/E-Decompiler
用来辅助分析易语言程序的IDA插件
NetKingJ/awesome-android-security
A Collection of Android (Samsung) Security Research References
Chemiculs/qengine
C++ 17 or higher control flow obfuscation library for windows binaries
LDrakura/Remote_ShellcodeLoader
远程shellcode加载&权限维持+小功能
gmh5225/CallMeWin32kDriver
Load your driver like win32k.sys
0mWindyBug/GhostMapperUM
manual map unsigned driver over signed memory
rogxo/ReadPhys
r/w virtual memory without attach
0mWindyBug/KDP-compatible-driver-loader
KDP compatible unsigned driver loader leveraging a write primitive in one of the IOCTLs of gdrv.sys
wizardengineer/krakensvm-mg
A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]
exploits-forsale/CVE-2024-21345
Proof-of-Concept for CVE-2024-21345
0x0d3ad/CVE-2024-3400
CVE-2024-3400
y11en/schtask-bypass
免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus
gognl/VMBR
A VMBR (Virtual-Machine Based Rootkit) which runs a guest OS and sends the attacker its data
rbmm/ARL
wowdev/TACTKeys
Automatically synchronized list of TACT keys
bigdickDMA/pubg-dma
killvxk/ARL
koala9527/code-ocr
ddddocr 封装成接口 一键解决简单验证码