Skip to content
View CaptainBoggle's full-sized avatar
😡
Symbolically Executing
😡
Symbolically Executing

Highlights

  • Pro

Block or report CaptainBoggle

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. kris kris Public

    A super stealthy linux rootkit PoC targeting modern kernel versions.

    C 2

  2. huff huff Public

    A ghost client for Minecraft 1.8.9.

    Java

  3. pitwall-at-home pitwall-at-home Public

    Python script to automatically post content from the McLaren F1 teamstream to a discord server via webhooks. Made during the Suzuka 2022 red flag.

    Python 5

  4. sesh sesh Public

    epic 31337 hacking software

    1

  5. SpiltGate SpiltGate Public archive

    Fully automated and undetectable splitgate anti-recoil utility.

    C 1

  6. Unix post-exploitation evasion tool.... Unix post-exploitation evasion tool. Uses syscall_intercept to create an LD_PRELOAD that you can use to have any program prompt you before performing actions that you may want to avoid.
    1
    #include <dlfcn.h>
    2
    #include <errno.h>
    3
    #include <execinfo.h>
    4
    #include <fcntl.h>
    5
    #include <libsyscall_intercept_hook_point.h>