- Tokyo, Japn
-
03:22
- 9h ahead - https://x64.moe
- @FAMASoon
- in/famasoon
Starred repositories
vertical widgets for oled and niceview screens using zmk (for split and non-split keyboards)
5ire is a cross-platform desktop AI assistant, MCP client. It compatible with major service providers, supports local knowledge base and tools via model context protocol servers .
Make "upx -d" unpacking impossible!
Dataset of reverse engineering tasks done using LLMs.
Claude Desktop for Debian-based Linux distributions
A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!
IDA Pro Plugin for serving MCP SSE server for cursor / claude
This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).
Astral-PE is a low-level mutator (headers obfuscator) for native Windows PE files (x32/x64)
Remix SPA mode + Firebase で「しずかなインターネット」の真似サイトを作った。
Slides from "Musing from Decades of Linux Kernel Security Research" at BOOTSTRAP25
Challenges & author writeups from ZeroDays CTF 2025.
Hacked up Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn a root shell. (and attempts to restore the damaged binary as well)
Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security testing.
Generate an undetectable PE ( .exe ), which bypasses windows defender / AV
Learning resources and external resources to help you prepare for your offsec certifications
"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS
A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.
For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.