Guilherme (guitmz)

guitmz

Geek Repo

Company:@devsbb

Location:Berlin

Home Page:https://www.guitmz.com

Twitter:@guitmz

Github PK Tool:Github PK Tool

Guilherme's repositories

ezuri

A Simple Linux ELF Runtime Crypter

Language:GoLicense:MITStargazers:216Issues:14Issues:1

memrun

Small tool to run ELF binaries from memory with a given process name

Language:AssemblyLicense:MITStargazers:147Issues:11Issues:1

midrashim

PT_NOTE to PT_LOAD x64 ELF infector written in Assembly

Language:AssemblyLicense:MITStargazers:39Issues:2Issues:0

nim-cephei

Probably the first ELF binary infector ever created in Nim.

Language:NimLicense:GPL-3.0Stargazers:28Issues:4Issues:0

nasty

Reverse text segment x64 ELF infector written in Assembly

Language:AssemblyLicense:MITStargazers:16Issues:3Issues:0

ansi-escape

Using ANSI escape codes with x64 Linux Assembly

Language:AssemblyLicense:MITStargazers:10Issues:2Issues:0

transferwise

A command line tool to get quotes from TransferWise

Language:GoLicense:MITStargazers:8Issues:2Issues:0

Paper-Repo

Aggregated content from the vx-underground paper collection. Files may not be named correctly.

Language:CStargazers:2Issues:2Issues:0

skeksi_virus

Devestating and awesome Linux X86_64 ELF Virus

Stargazers:2Issues:0Issues:0

beginning-x64-assembly-programming

Source Code for 'Beginning x64 Assembly Programming' by Jo Van Hoey

License:NOASSERTIONStargazers:1Issues:0Issues:0

gomatrix

Displays "The Matrix" in a terminal

License:BSD-2-ClauseStargazers:1Issues:0Issues:0

Vx-Libraries

Collection of source code Libraries which can be utilized by Malware

License:MITStargazers:1Issues:0Issues:0

.emacs

emacs init file with gopls, flycheck, golangci-lint

Language:Emacs LispStargazers:0Issues:2Issues:0

ansiwave

A mashup of ANSI art and MIDI music

Language:NimLicense:UnlicenseStargazers:0Issues:1Issues:0

debug

Fork of pkg/debug that adds some additional functionality.

Language:GoStargazers:0Issues:1Issues:0
License:MITStargazers:0Issues:0Issues:0

dr-quine

A quine is a computer program (a kind of metaprogram) whose output and source code are identical. As a challenge or for fun, some programmers try to write the shortest quine in a given programming language. The operation that consist of simply opening the source file and displaying it is considered cheating. More generally, a program that uses any data entry cannot be considered a valid quine. A trivial solution is a program whose source code is empty. Indeed, the execution of such a program produces for most languages no output, that is to say the source code of the program.

Language:AssemblyStargazers:0Issues:1Issues:0

echo-gorm-example

đź“– echo web framework and gorm orm example

License:MITStargazers:0Issues:0Issues:0

Family

Collection of Malware source code by Language and Family.

Language:AssemblyLicense:MITStargazers:0Issues:0Issues:0

HelloSilicon

An attempt with assembly on the machine we must not speak about

License:MITStargazers:0Issues:0Issues:0

ldca

Self-replicating, self-modifying Assembly program that can evolve into every possible computer program in the universe (EXPERIMENTAL)

License:GPL-3.0Stargazers:0Issues:0Issues:0

Linux.RV

PoC Reverse Text segment ELF File infector

Stargazers:0Issues:0Issues:0

polybar-forecast

A weather forecast module for Polybar

Stargazers:0Issues:0Issues:0

SBTG

PoC Metamorphic Encoder engine for ELF32 files

Stargazers:0Issues:0Issues:0

scan-action

Inline Image Scan Github Action

License:Apache-2.0Stargazers:0Issues:0Issues:0

SHELF-Loading

Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.

Stargazers:0Issues:0Issues:0

Vx-Engines

Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware

Language:AssemblyLicense:MITStargazers:0Issues:0Issues:0

wazuh-kubernetes

Wazuh - Wazuh Kubernetes

Language:ShellLicense:GPL-2.0Stargazers:0Issues:1Issues:0

woody_woodpacker

“Packers” are tools that consist on compressing executable programs (.exe, .dll, .ocx ...) and encrypt them simultaneously. During execution, a program passing through a packer is loaded in memory, compressed and encrypted, then it will be decompressed (decrypted as well) and finally be executed. The creation of this kind of program is linked to the fact that antivirus programs generally analyse programs when they are loaded in memory, before they are executed. Thus, encryption and compression of a packer allow to bypass this behavior by obfuscating the content of an executable until it execution.

Language:CStargazers:0Issues:1Issues:0

Zines

Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference

Stargazers:0Issues:0Issues:0