Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View MohammadMahdiJavid's full-sized avatar
💭
I may be slow to respond.
💭
I may be slow to respond.

Highlights

  • Pro

Organizations

@Roya2Real @ParizanTeam @NLPLab-IUST

Block or report MohammadMahdiJavid

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

A component-based OS

C 199 71 Updated Feb 18, 2026

TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structured intelligence. Using the DeepSeek LLM, it extracts MITRE AT…

Python 51 12 Updated Jun 21, 2025

A minimal GPU design in Verilog to learn how GPUs work from the ground up

SystemVerilog 11,754 1,051 Updated Aug 18, 2024

The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.

Python 14,606 3,314 Updated Oct 21, 2024

Lab used for workshop and CTF

PowerShell 501 53 Updated Feb 3, 2026

One proxy to rule them all

HCL 126 12 Updated Jul 28, 2024

LIEF - Library to Instrument Executable Formats (C++, Python, Rust)

C++ 5,294 714 Updated Feb 22, 2026

The continuing development of the legendary VBA gameboy advance emulator.

C++ 3,789 353 Updated Feb 25, 2026

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python 10,133 1,191 Updated Feb 26, 2026

SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems

C 17 Updated Feb 21, 2024

Unlocks docker hub in Russia, Cuba, Iran, North Korea, Republic of Crimea, Sudan, and Syria

Shell 365 36 Updated Jun 12, 2024

CTF Writeups

Python 15 1 Updated Aug 20, 2023

This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…

Python 4,377 575 Updated Dec 16, 2025

CTF framework and exploit development library

Python 13,287 1,819 Updated Feb 23, 2026

Code samples to go along with the blog post on how to run code at load/unload time when using LD_PRELOAD to inject libraries.

C 12 3 Updated May 18, 2022

NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]

TeX 19 2 Updated Nov 17, 2022

PEDA - Python Exploit Development Assistance for GDB

Python 6,107 828 Updated Jul 29, 2024

Sequoia exploit (7/20/21)

C 78 62 Updated Jul 20, 2021

A collection of resources to learn Reverse Engineering from start!

1,386 100 Updated Mar 18, 2025

A not-curated list of cloud hacking labs

26 1 Updated Apr 18, 2024

Demo serverless applications, examples code snippets and resources for PHP

PHP 364 136 Updated Jan 5, 2024

The essential toolkit for reversing, malware analysis, and cracking

Inno Setup 974 147 Updated Jun 9, 2025

IAT Unhooking proof-of-concept

Assembly 34 5 Updated Apr 7, 2024

Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)

C++ 591 114 Updated Oct 29, 2025

Golang tool which helps dropping the irrelevant entries from your ffuf result file.

Go 143 20 Updated Sep 16, 2024

Generate FUD backdoors

C 262 56 Updated Mar 17, 2023

notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)

Go 3,544 237 Updated Apr 3, 2024

Lifetime AMSI bypass

C++ 671 91 Updated Sep 26, 2023

A script to detect if xz is vulnerable - CVE-2024-3094

Python 4 Updated Mar 31, 2024
Next