Security tools, embedded hardware & odd software — Jacek Strzalkowski
Web-based shellcode assembly workbench powered by Keystone. Write x86/x64 assembly, get encoded shellcode bytes instantly with automatic bad character detection and color-highlighted output. Includes a database of ready-made payload templates.
Browser-only ROP gadget analysis tool - no server, no install. Load an rp++ output file and instantly see all gadget types categorised, search and filter, then export a clean summary. Built for exploit developers doing binary exploitation research.
Full-stack WireGuard-based VPN service with a Laravel backend, Android client, Electron desktop client for Windows/Linux, and a TrueNAS SCALE app. Supports Google OAuth, server browsing, one-click connect, and auto-connect on startup.
Multi-instrument aviation panel on ESP32 + TFT touchscreen. Compass, dual fuel gauges, speedometer, VSI, altimeter, artificial horizon, RPM and airspeed rendered with LVGL from BMP assets on SD card. Serial input for flight sim integration.
Prototype dual fuel-gauge instrument on ESP32 + LVGL. Two independent analogue needles with configurable sweep angles and rotation direction - the direct ancestor of MainCompass.
STM32-based flight-sim trim wheel controller. A rotary encoder drives a servo via PWM and accepts serial commands from PC. Physical tactile hardware for flight simulators.
WinDbg automation script using PyKD. Iteratively finds bad characters in shellcode buffers by running your PoC inside WinDbg and inspecting memory after each crash. Hours of manual work cut to minutes.
C# Windows app for automated telescope alignment using ASCOM. Slews to alignment stars, plate-solves with ASTAP, syncs the mount - fully automating 20 minutes of tedious star-hopping into one button press.
WinDbg/PyKD companion to the browser ROP tool. Scans module IATs for VirtualAlloc/WriteProcessMemory, parses gadget sequences, assists building multi-stage ROP chains programmatically.
Laravel-based vibration monitoring and control system. Early development - more details coming.
I am a hacker and security engineer at Rockwell Automation, working on industrial control system security. My day job involves poking at PLCs, SCADA systems, and ICS protocols - finding the kinds of bugs that can make conveyor belts go rogue or turbines behave unexpectedly. On the offensive side I specialise in Windows userland exploitation: ROP chains, shellcode crafting, bad char analysis, the whole stack.
Outside work I build hobby projects all over the map - from embedded instrument panels for flight simulators (physical gauges are cooler than on-screen ones), to automated telescope alignment tools, to a personal VPN service I run myself. I like problems where the real world meets software: hardware you can touch, protocols that were not designed with security in mind, systems that were not meant to be debugged.
All public projects live on gitlab.kirisoft.pl. Fork what looks useful, open an issue if something is broken.