Skip to content
View Anonym0ose's full-sized avatar

Block or report Anonym0ose

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Work-in-progress tool to reverse unity's IL2CPP toolchain.

C# 1,677 196 Updated Sep 24, 2024

🎓 Path to a free self-taught education in Computer Science!

170,509 21,535 Updated Sep 23, 2024

Compile asm code into C# functions on fly!

C# 112 7 Updated Feb 5, 2022
Python 92 11 Updated Jun 30, 2021

C# Kernel Mode Driver example using NativeAOT

C# 180 27 Updated Jan 3, 2022

GooseMod is a new, store-driven Discord mod.

JavaScript 404 19 Updated Sep 27, 2022

My Writeups

Python 7 Updated Jan 18, 2021

Simple tool to extract and decompress embedded resources processed by Fody Costura

C# 63 11 Updated Jul 10, 2024

Shell extension for opening executables in IDA

C 182 13 Updated Feb 17, 2023

Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories

Jupyter Notebook 1,094 174 Updated Nov 14, 2020

A bunch of parsers for PE and PDB formats in C

C 221 42 Updated May 15, 2024

A C header-only HTTP/HTTPS server and client library

C 12,809 2,266 Updated Sep 27, 2024

🔑KMS_VL_ALL - Smart Activation Script

Batchfile 2,948 425 Updated Oct 18, 2022

An experimental dynamic malware unpacker based on Intel Pin and PE-sieve

C 57 7 Updated Aug 21, 2024

Unofficial revival of the well known .NET debugger and assembly editor, dnSpy

C# 6,720 448 Updated Sep 21, 2024

The superior Discord API wrapper

C# 206 45 Updated Aug 7, 2023

Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file

C 628 114 Updated Mar 11, 2024

Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction within NTDLL.

C 212 42 Updated Feb 20, 2023

DEFCON 27 workshop - Modern Debugging with WinDbg Preview

Python 700 130 Updated Sep 18, 2023

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

C 5,805 1,160 Updated Sep 22, 2024

Generates x86, x64, or AMD64 x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

C 3,521 626 Updated Sep 12, 2024

Application to route DbgView 4.90 output to a Discord bot.

C# 12 1 Updated May 7, 2021

Blazing fast and correct x86/x64 disassembler, assembler, decoder, encoder for Rust, .NET, Java, Python, Lua

Rust 2,899 233 Updated Sep 28, 2024

Parses MSDN documentation into an XML file

Python 30 14 Updated Jan 10, 2012

Imports MSDN documentation into IDA Pro

Python 51 14 Updated Jan 10, 2012

✨ Skin boosts a League of Legends ARAM lobby without consuming any RP, temporarily unlocking a skin for everyone and granting you extra BE at the end of your match

Python 68 20 Updated May 21, 2021

Stealthy way to hijack the existing game process handle within the game launcher (currently supports Steam and Battle.net). Achieve external game process read/write with minimum footprint.

C 96 22 Updated Apr 10, 2021

Keystone assembler binding written in Dart

Dart 5 Updated Apr 20, 2021
Next