Skip to content
View LegionXKP's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report LegionXKP

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. Net_Run_In_Memory_HostingCLR Net_Run_In_Memory_HostingCLR Public

    Executing a .NET Assembly from C++ in Memory (CLR Hosting)

    C++ 6 2

  2. MosaiqueRAT MosaiqueRAT Public

    Forked from thdal/MosaiqueRAT

    Mosaique - Remote administration tools

    C# 2 1

  3. Browsers-Stealer Browsers-Stealer Public

    Forked from FallenAstaroth/stink

    Стиллер куки и паролей браузера, айпи, местоположения с отправкой на почту.

    Python 2

  4. MalwareDropper MalwareDropper Public

    Forked from l0qi/MalwareDropper

    🎌 Simple MalwareDropper

    C# 1 3

  5. VBA-RunPE VBA-RunPE Public

    Forked from itm4n/VBA-RunPE

    A VBA implementation of the RunPE technique or how to bypass application whitelisting.

    VBA

  6. spoofing-office-macro spoofing-office-macro Public

    Forked from christophetd/spoofing-office-macro

    🐟 PoC of a VBA macro spawning a process with a spoofed parent and command line.

    VBA