Windows rootkit designed to work with BYOVD exploits
🤖 Kill The Protected Process 🤖
Real fucking shellcode encryptor & obfuscator tool
A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN
A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving conten…
SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!
TangGo测试平台是无糖信息技术有限公司集多年渗透测试实战经验设计和开发的国产化综合性测试平台,为软件测试、网络安全从业人员提供强大且易用的测试工具及多人协同的工作环境,主要用于Web站点的功能测试、安全测试和安全评估。
Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.
PoCs and tools for investigation of Windows process execution techniques
Turns any rooted phone into the legendary USB Rubber Ducky. Android USB HID Keystroke Injector
User Enumeration of Microsoft Teams users via API
RCE PoC for Tensorflow using a malicious Lambda layer
TerminatorZ is a highly sophisticated and efficient Offensive CVE Exploitation Framework that scans for top potential vulnerabilities with k…
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
My public notes about offensive security
Nuclei templates written by geeknik. Claude is my co-pilot. 🤖
The Big Brother V4.0 is a weaponized OSINT platform featuring username enumeration (473+ platforms), quad-vector visual intelligence, Sky Ra…
E-mails, subdomains and names Harvester - OSINT
The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.
Process Injection using Thread Name
Awesome list of keywords and artifacts for Threat Hunting sessions
This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionals…
ThreatTracer - A tool to identify CVE by name & version and more by @FR13ND0x7F
A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).