Skip to content
View 3HiPeR's full-sized avatar

Block or report 3HiPeR

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).

C++ 3,163 439 Updated Dec 14, 2024

Port of Cobalt Strike's Process Inject Kit

C++ 145 19 Updated Dec 1, 2024

BSides Prishtina 2024 Malware Development and Persistence workshop

C 64 14 Updated Oct 23, 2024

HVNC for Cobalt Strike

C 1,173 183 Updated Dec 7, 2023

⚠️ malware development

C 475 57 Updated May 27, 2024

Checklists for Testing Security environment

727 165 Updated Mar 24, 2024

FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading

Rust 227 24 Updated Sep 26, 2024

My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.

Assembly 32 4 Updated Jul 23, 2024

Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR hooks in Windows.

C 224 30 Updated Jul 31, 2024

PDF dropper Red Team Scenairos

Python 178 46 Updated Jul 31, 2024

This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes through the use of runspace.

C# 192 38 Updated Jul 26, 2020

Customizable Linux Persistence Tool for Security Research and Detection Engineering.

Shell 490 51 Updated Dec 19, 2024

A script to automatically install Peda+pwndbg+GEF plugins for gdb

Shell 409 82 Updated Aug 3, 2023

A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…

C++ 495 83 Updated Jun 12, 2024

Penetration Testing with Shellcode, published by Packt

Python 37 17 Updated Oct 31, 2022

smbclient-ng, a fast and user friendly way to interact with SMB shares.

Python 832 69 Updated Dec 18, 2024

Credentials recovery project

Python 9,686 2,042 Updated Oct 18, 2024

Open-source Windows and Office activator featuring HWID, Ohook, KMS38, and Online KMS activation methods, along with advanced troubleshooting.

Batchfile 109,876 10,625 Updated Dec 21, 2024

Macro-header for compile-time C obfuscation (tcc, win x86/x64)

C 987 76 Updated Dec 12, 2024

Cobalt Strike HTTPS beaconing over Microsoft Graph API

C 557 87 Updated Jun 25, 2024

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Go 11,291 2,024 Updated Aug 21, 2024
Python 677 84 Updated Dec 17, 2024

DarkGPT is an OSINT assistant based on GPT-4-200K (recommended use) designed to perform queries on leaked databases, thus providing an artificial intelligence assistant that can be useful in your t…

Python 2,164 293 Updated Sep 21, 2024

This is a multi-use bash script for Linux systems to audit wireless networks.

Shell 6,613 1,178 Updated Dec 5, 2024

Minimal Arch Installation with KDE Plasma Desktop from scratch.

141 18 Updated Dec 1, 2024

Golang reverse proxy with CobaltStrike malleable profile validation.

Go 110 11 Updated Jan 19, 2023

Hide your P/Invoke signatures through other people's signed assemblies

C# 202 32 Updated Mar 10, 2024

This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them

7,295 1,399 Updated Sep 25, 2024

InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditiona…

C 184 29 Updated Jul 9, 2021

a tool to help operate in EDRs' blind spots

Python 670 76 Updated Dec 2, 2024
Next