Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 36 million developers.
Hide content and notifications from this user.
Learn more about blocking users
Contact Support about this user’s behavior.
Learn more about reporting abuse
Fast, secure, efficient backup program
A modern alternative to the Microsoft Assembly Binding Log Viewer (FUSLOGVW.exe)
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies from memory and runs them with parameters
A resilient peer-to-peer botnet agent in .NET
🍀 Trefle is a botanical JSON REST API for plants species, allowing you to search and query over all the registered species, and build the next gardening apps and farming robots.
Quality content going against the prevailing winds of the internet.
Diaphora, the most advanced Free and Open Source program diffing tool.
Scripts for the Ghidra software reverse engineering suite.
Debug Windows Application / Kernel
Cheat that uses a driver instead WinAPI for Reading / Writing memory.
Code that allows running another windows PE in the same address space as the host process.
Demo of the potential of C# for systems programming with CoreRT
🎨 Portrait Builder tool for Crusader Kings II
Parser for Crusaders Kings 2 save files (*.ck2)
🤩 emoji.ico changes your boring default folder icons into emojis! Who don't love that?
Viewer for JSON files that can be GBs large.
Portable Executable (PE) library written in .Net
A Windows native DLL injection library written in C# that supports several methods of injection.
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
WinDbg extension for data mining managed heap. It also includes commands to list http request, wcf services, WIF tokens among others
A tool for in-depth analysis of USB HID devices communication
A realtime, decentralized, offline-first, mutable graph protocol to sync the web.
C# client for the LendingClub API
C# dictionary that implements a Robin Hood hash table with backwards shifting deletion
Mobile, desktop and website Apps with the same code
[ab]using Unicode to create tragedy
Machine learning, computer vision, statistics and general scientific computing for .NET
peinjector - MITM PE file infector