Skip to content

Instantly share code, notes, and snippets.

@gmh5225
gmh5225 / VGK DriverEntry Analysis.md
Created March 14, 2026 07:47 — forked from rhaym-tech/VGK DriverEntry Analysis.md
A well detailed Riot Vanguard Kernel AntiCheat (vgk.sys) analysis

Overall threshold and difficulty

Vanguard's anti-cheating system is a protection system that pays more attention to the threshold, and the overall design and realization of the national re-examination anti-cheating system is still not the same. Here we first discuss the threshold and the difficulty of analysis, and then discuss these in blocks later.

  1. After the game is installed, Riot Vanguard will be installed to C:\Program Files\Riot Vanguard Under the catalog. Its overall anti-cheating is driven by vgk.sys And the three-ring program vgc.exe achieve
  2. The VGK-driven boot is turned on, and the boot mode is activated. When the game is activated, it will be verified that this state cannot be turned on if it is not turned on. VGK drive will intercept all unsigned, loophole-driven and black-driven loading. That is, all public ARK and some Rootkit tools, even Dbgview, cannot be used. However, after testing, the driver can be successfully loaded with a time-poke signature.
  3. Neither Ring3 nor Ring0 can w
@gmh5225
gmh5225 / world-id-protocol_attestation.log
Created February 22, 2026 02:07 — forked from dcbuild3r/world-id-protocol_attestation.log
Attestation for world-id-protocol MPC Phase 2 Trusted Setup ceremony
Hey, I'm dcbuild3r-19372745 and I have finalized the world-id-protocol MPC Phase2 Trusted Setup ceremony.
The following are my contribution signatures:
Circuit # 1 (oprfkeygenproof13)
Contributor # final
Contribution Hash: 4d431429 12461b17 2e14232b 6b1c878b
48248de8 b8f1340c 18e93c6d cf2c4b10
f447a3d7 8be20b16 772080d6 2cefb8e1
248bfc91 816d34da 07bacde2 5c384fd2
@gmh5225
gmh5225 / README.md
Created February 22, 2026 01:25 — forked from camel-cdr/README.md
Visualizing the RISC-V Instruction Set

Visualizing the RISC-V Instruction Set

Earlier today, I came across the blog post "Visualizing the ARM64 Instruction Set" and got inspired to give it a shot my self.

After hacking together a quick script and fiddling with the bit order and colors for way too long, I managed to create a decent visualization of the RISC-V instruction encoding. You can find my code below.

The following graphics cover the 64-bit part of the RISC-V ISA, including all ratified 64-bit extensions, with opcodes extracted from the riscv/riscv-opcodes repo.

I mapped the opcodes to 2D coordinates with a Morton space-filling curve.

@gmh5225
gmh5225 / README.md
Created February 2, 2026 05:20 — forked from emschwartz/README.md
The Most Popular Blogs of Hacker News in 2025

This is an OPML version of the HN Popularity Contest results for 2025, for importing into RSS feed readers.

@gmh5225
gmh5225 / clawdbot-selfcheck-en.md
Created January 26, 2026 15:50 — forked from zhixianio/clawdbot-selfcheck-en.md
Clawdbot Security Self-Check / Clawdbot 安全自检

Clawdbot Security Self-Check

Help me check my Clawdbot security posture. We'll go step by step—wait for my reply before continuing to the next step.


Step 1: Runtime Environment

What device is Clawdbot running on?

IO_STATUS_BLOCK iosb;
UNICODE_STRING path = RTL_CONSTANT_STRING(L"\\SystemRoot\\System32\\ntdll.dll");
OBJECT_ATTRIBUTES attr = RTL_CONSTANT_OBJECT_ATTRIBUTES(&path, 0);
HANDLE file, section;
// only FILE_EXECUTE
NTSTATUS status = NtCreateFile(&file, FILE_EXECUTE, &attr, &iosb, nullptr, 0, 0, FILE_OPEN, 0, nullptr, 0);
printf("NtCreateFile %lx\n", status);
// request PAGE_EXECUTE when creating - the only permission compatible with FILE_EXECUTE.
@gmh5225
gmh5225 / ntlmdecoder.py
Created January 20, 2026 10:33 — forked from tingtho/ntlmdecoder.py
NTLM auth-string decoder
#!/usr/bin/env python
## Decodes NTLM "Authenticate" HTTP-Header blobs.
## Reads the raw blob from stdin; prints out the contained metadata.
## Supports (auto-detects) Type 1, Type 2, and Type 3 messages.
## Based on the excellent protocol description from:
## <http://davenport.sourceforge.net/ntlm.html>
## with additional detail subsequently added from the official protocol spec:
## <http://msdn.microsoft.com/en-us/library/cc236621.aspx>
##
@gmh5225
gmh5225 / ida_configuration.md
Created January 6, 2026 04:47 — forked from you0708/ida_configuration.md
自分的 IDA Pro のオススメ設定

自分的 IDA のオススメ設定

逆アセンブル画面メインで使う自分の IDA の設定。設定の保存方法は以下のとおり。

  • 設定した後に、Windows -> Save desktop... -> Default で保存
    • ウインドウ配置だけでなく、表示に関する多くの設定はこれで保存可能
  • $IDADIR/cfg 内の設定値を参照し、それらの設定を変更した内容だけを記載した .cfg ファイルを $IDAUSR/cfg に配置
@gmh5225
gmh5225 / FastUniformLoadWithWaveOps.txt
Created January 6, 2026 04:40 — forked from sebbbi/FastUniformLoadWithWaveOps.txt
Fast uniform load with wave ops (up to 64x speedup)
In shader programming, you often run into a problem where you want to iterate an array in memory over all pixels in a compute shader
group (tile). Tiled deferred lighting is the most common case. 8x8 tile loops over a light list culled for that tile.
Simplified HLSL code looks like this:
Buffer<float4> lightDatas;
Texture2D<uint2> lightStartCounts;
RWTexture2D<float4> output;
[numthreads(8, 8, 1)]