- All languages
- Arduino
- Assembly
- Batchfile
- Boo
- C
- C#
- C++
- CMake
- CSS
- CoffeeScript
- Dockerfile
- EJS
- Go
- HCL
- HTML
- Hack
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kaitai Struct
- Kotlin
- Lua
- MATLAB
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smali
- TypeScript
- VBA
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zig
Starred repositories
Scrapy, a fast high-level web crawling & scraping framework for Python.
An easy-to-use and lightweight API wrapper for Censys APIs.
E-mails, subdomains and names Harvester - OSINT
ReVanced eXtended YT and YT-M for both root and non-root users.
mgeeky / saruman
Forked from elfmaster/sarumanELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)
mgeeky / Autorize
Forked from Quitten/AutorizeAutomatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease application security people work and allow them perform an automa…
mgeeky / ADVobfuscator
Forked from andrivet/ADVobfuscatorObfuscation library based on C++11/14 and metaprogramming
mgeeky / pinjectra
Forked from SafeBreach-Labs/pinjectraPinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)
mgeeky / StayKit
Forked from 0xthirteen/StayKitCobalt Strike kit for Persistence
mgeeky / SharpStay
Forked from 0xthirteen/SharpStay.NET project for installing Persistence
mgeeky / rpivot
Forked from klsecservices/rpivotsocks4 reverse proxy for penetration testing
Seven different DLL injection techniques in one single project.
mgeeky / ssf
Forked from securesocketfunneling/ssfSecure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platform
mgeeky / artifacts-kit
Forked from forrest-orr/artifacts-kitPseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
mgeeky / malleable-c2
Forked from threatexpress/malleable-c2Cobalt Strike Malleable C2 Design and Reference Guide
mgeeky / C2concealer
Forked from RedSiege/C2concealerC2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
mgeeky / pocs
Forked from corkami/pocsProof of Concepts (PE, PDF...)
mgeeky / C3
Forked from WithSecureLabs/C3Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
A bunch of my exploit development helper tools, collected in one place.
Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
Red Team oriented C# Simple HTTP & WebDAV Server with Net-NTLM hashes capture functionality
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.