Stars
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Advanced In-Memory PowerShell Process Injection Framework
My musings with PowerShell
Python GUI based tool to generate lnk files with a payload and decoy files embedded inside.
Tool to deploy a post-exploitation prompt at any time
Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is done to obtain a shell via follow-up user interaction natively through …
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
A Go implementation of Cobalt Strike style BOF/COFF loaders.
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
Creating a repository with all public Beacon Object Files (BoFs)
Privilege escalation to root using sudo chroot, NO NEED for gcc installed.
A small example of loading BOFs in Python with pure reflection
pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Qwen Code is a coding agent that lives in the digital world.
Cybersecurity AI (CAI), the framework for AI Security
Find, verify, and analyze leaked credentials
hicodersofficial / blackeye
Forked from ZodiDuToit/blackeyeThis is the updated version of blackeye with ngrok
Succeser of blackeye v1.0, phishing tool with new 10 page added
A portfolio of phishing email analysis demonstrating social engineering awareness, email header inspection, and secure communication skills
Lightweight coding agent that runs in your terminal
Python tool designed to identify misconfigured DMARC and SPF settings in domains. It resolves DNS records, checks for DMARC policies, SPF records, and logs the results for each domain. Additionally…