Skip to content
View sbhtkhmjeuc's full-sized avatar
Block or Report

Block or report sbhtkhmjeuc

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Beta Lists are currently in beta. Share feedback and report bugs.

Starred repositories

19 stars written in C
Clear filter

The open-source observability platform everyone needs!

C 69,436 5,796 Updated Jul 5, 2024

Redis is an in-memory database that persists on disk. The data model is key-value, but many different kind of values are supported: Strings, Lists, Sets, Sorted Sets, Hashes, Streams, HyperLogLogs,…

C 65,562 23,579 Updated Jul 4, 2024

The PHP Interpreter

C 37,567 7,688 Updated Jul 5, 2024

A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP…

C 34,793 6,250 Updated Jul 5, 2024

tmux source code

C 33,738 2,053 Updated Jun 24, 2024

A tiling window manager for macOS based on binary space partitioning

C 22,354 627 Updated Jun 30, 2024

Alternative firmware for ESP8266 and ESP32 based devices with easy configuration using webUI, OTA updates, automation using timers or rules, expandability and entirely local control over MQTT, HTTP…

C 21,707 4,717 Updated Jul 4, 2024

John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs

C 9,625 2,042 Updated Jul 4, 2024

proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…

C 6,275 603 Updated Jun 8, 2024

OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.

C 4,330 1,024 Updated Jun 6, 2024

Dive into CPython internals, trying to illustrate every detail of CPython implementation

C 4,037 431 Updated Dec 15, 2023

syslog-ng is an enhanced log daemon, supporting a wide range of input and output methods: syslog, unstructured text, queueing, SQL & NoSQL.

C 2,074 465 Updated Jul 4, 2024

Hiding kernel-driver for x86/x64.

C 2,010 412 Updated Jan 14, 2024

Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as g…

C 754 145 Updated Mar 14, 2023

Library and tools to access the Extensible Storage Engine (ESE) Database File (EDB) format.

C 331 90 Updated Jun 27, 2024

CVE-2023-4911 proof of concept

C 163 31 Updated Oct 8, 2023

Research material and Proof-of-Concepts for Aleph Research Findings

C 83 12 Updated Nov 16, 2021

Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).

C 78 8 Updated Jan 28, 2024