Skip to content
View NullDev's full-sized avatar
:octocat:
(โ—•โ€ฟโ—•)๏ปฟ
:octocat:
(โ—•โ€ฟโ—•)๏ปฟ

Sponsoring

@bottlesdevs
@josdejong

Organizations

@EpicGames @NVIDIAGameWorks @NullDevCo @EpticMC @savetheinternetinfo @pr0-dev @EMMA-Emotion-AI @shiro-os @idkr-client

Block or report NullDev

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
Stars

InfoSec

Various Tools, PoC's, Exploits, etc regarding Pen-Testing, InfoSec, Reverse Engineering & Co
59 repositories

Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.

C++ 1,190 193 Updated Jun 17, 2022

Principle of WinRAR key generation.

C++ 1,655 2,903 Updated Nov 9, 2025

FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.

Python 3,833 511 Updated Jan 13, 2026

CORS Misconfiguration Scanner

Python 1,493 186 Updated Sep 17, 2022

.NET debugger and assembly editor

C# 28,805 5,451 Updated Dec 20, 2020

Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting

Shell 2,301 407 Updated Jun 27, 2024

CVE-2021-40444 PoC

HTML 1,705 479 Updated Dec 25, 2021

Preimage attack against NeuralHash ๐Ÿ’ฃ

Python 673 33 Updated Sep 15, 2025

Automation for javascript recon in bug bounty.

Shell 1,064 184 Updated Sep 9, 2023

MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.

Python 12,031 1,177 Updated Jan 12, 2026

One stop place for Jira security reconnaissance and exploitation in your proximity

Python 199 27 Updated Jan 8, 2026

Collection of Scripts for shodan searching stuff.

Python 1,134 344 Updated Jan 14, 2026

The XSS Hunter service - a portable version of XSSHunter.com

JavaScript 1,537 305 Updated Dec 7, 2022

ransomware open-sources

C# 795 399 Updated Jul 8, 2020

Rewrite of the popular wireless network auditor, "wifite"

Python 7,532 1,567 Updated Aug 20, 2024

Javascript Anti Cheats 101

109 32 Updated Sep 22, 2022

Google's differential privacy libraries.

Go 3,281 409 Updated Jan 16, 2026

Ghidra is a software reverse engineering (SRE) framework

Java 63,578 7,060 Updated Jan 15, 2026

Executable that mutates its own code

C# 392 110 Updated Jun 28, 2025

Fast Elliptic Curve Cryptography in plain javascript

JavaScript 1,763 508 Updated Nov 13, 2024

A simple SHA-256 / SHA-224 hash function for JavaScript supports UTF-8 encoding.

JavaScript 952 259 Updated Nov 21, 2025

Defeating Windows User Account Control

C 7,263 1,412 Updated Jan 11, 2026

fsociety Hacking Tools Pack โ€“ A Penetration Testing Framework

Python 11,799 2,101 Updated Aug 8, 2024

Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.

Python 917 133 Updated Jun 27, 2017

The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.

Python 14,366 3,282 Updated Oct 21, 2024

Do you think you are safe using private browsing or incognito mode?. ๐Ÿ˜„ ๐Ÿ‘ฟ This will prove that you're wrong. Previously hosted at nothingprivate.ml

JavaScript 2,209 157 Updated Dec 9, 2025

End-To-End is a crypto library to encrypt, decrypt, digital sign, and verify signed messages (implementing OpenPGP)

JavaScript 4,131 297 Updated Apr 9, 2023

Password Hash Identification

Python 222 46 Updated Nov 25, 2013

Remote administration service which uses twitter as a command and control server

Python 719 182 Updated Feb 25, 2021