Skip to content
View rhpco's full-sized avatar

Organizations

@Ingenuity-Fainting-Goats

Block or report rhpco

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

53 stars written in C
Clear filter

Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

C 14,614 2,133 Updated Jan 31, 2026

Small and highly portable detection tests based on MITRE's ATT&CK.

C 11,542 3,055 Updated Jan 20, 2026

RandomX, KawPow, CryptoNight and GhostRider unified CPU/GPU miner and RandomX benchmark

C 9,797 3,789 Updated Feb 1, 2026

Leaked Mirai Source Code for Research/IoC Development Purposes

C 9,164 3,514 Updated Oct 16, 2025

A repository for learning various heap exploitation techniques.

C 8,410 1,246 Updated Jan 15, 2026

Course materials for Modern Binary Exploitation by RPISEC

C 5,912 908 Updated Dec 9, 2021

This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.

C 4,342 514 Updated Jan 27, 2026

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

C 3,215 824 Updated Sep 3, 2022

HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

C 2,930 578 Updated Feb 24, 2025

SSH man-in-the-middle tool

C 1,732 212 Updated Jul 2, 2021

Resources related to GitHub Security Lab

C 1,578 285 Updated Dec 2, 2025

A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.

C 1,549 140 Updated Jan 31, 2026

Set of tests for fuzzing engines

C 1,461 280 Updated Aug 25, 2021

CTF Field Guide

C 1,409 245 Updated Nov 15, 2024

Linux Binary Exploitation

C 1,355 210 Updated Jun 15, 2021

Exercises to learn how to fuzz with American Fuzzy Lop

C 1,274 198 Updated Oct 12, 2022

Zero-Day Code Injection and Persistence Technique

C 1,248 418 Updated Aug 24, 2022

Tool for injecting a shared object into a Linux process

C 1,221 254 Updated Feb 23, 2022

Cloudflare Blog code samples

C 1,220 255 Updated Jan 21, 2026

Credentials Dumper for Linux using eBPF

C 1,157 65 Updated Sep 9, 2024

SQL / SQLI tokenizer parser analyzer

C 1,027 280 Updated Oct 4, 2023

Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)

C 971 195 Updated Dec 11, 2020

A collection of vulnerable ARM binaries for practicing exploit development

C 926 172 Updated Nov 15, 2021

Cryptographic library

C 840 82 Updated Dec 5, 2025

Demos of various injection techniques found in malware

C 797 189 Updated Feb 15, 2022

A collection of my Semgrep rules to facilitate vulnerability research.

C 779 79 Updated Jan 27, 2026

Tool for extracting information from newly spawned processes

C 776 113 Updated May 11, 2025

Tiny SHell is an open-source UNIX backdoor.

C 706 187 Updated Sep 28, 2013

binary patching from Python

C 638 83 Updated Jul 6, 2023
Next