Skip to content
View TheGreatestGgoat's full-sized avatar

Block or report TheGreatestGgoat

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Simple C# Redirector

C# 73 9 Updated Dec 3, 2024

ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.

Zig 139 24 Updated Dec 21, 2024

Python tool for converting files and office documents to Markdown.

Python 28,516 1,118 Updated Dec 21, 2024

Payload development framework

Python 653 99 Updated Dec 23, 2024

Stage 0

C++ 120 23 Updated Dec 18, 2024

Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process

C 241 37 Updated Jan 21, 2024

Mythic C2 Agent written in x64 PIC C

C 61 5 Updated Dec 18, 2024

Windows batch script that finds misconfiguration issues which can lead to privilege escalation.

PowerShell 554 94 Updated Dec 1, 2024

Situational Awareness commands implemented using Beacon Object Files

C 1,299 222 Updated Dec 16, 2024

A collection of position independent coding resources

C 59 2 Updated Dec 21, 2024

Aims to identify sleeping beacons

C 503 50 Updated Dec 9, 2024

Killer is a simple tool designed to bypass AV/EDR security tools using various evasive techniques.

C++ 767 123 Updated Jul 2, 2024

Post-Ex BOF tooling for Hannibal

C 11 1 Updated Nov 20, 2024

DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely

C++ 281 39 Updated Dec 13, 2024

C++ self-Injecting dropper based on various EDR evasion techniques.

C 362 66 Updated Feb 11, 2024

Cybersources is a repository that curates a comprehensive collection of cybersecurity tools and resources, aiming to enhance knowledge, skills, and collaboration within the cybersecurity community.

415 42 Updated Dec 28, 2024

A BOF that runs unmanaged PEs inline

C 561 66 Updated Oct 23, 2024

Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.com/.

774 157 Updated Oct 28, 2022

Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

C 643 95 Updated Jan 19, 2024

LLM Agent and Evaluation Framework for Autonomous Penetration Testing

Python 30 7 Updated Dec 9, 2024

Windows Dependencies

C# 482 11 Updated Dec 25, 2024

Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…

C++ 388 64 Updated Nov 19, 2024

A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.

PowerShell 969 92 Updated Dec 26, 2024

A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.

C# 647 116 Updated May 15, 2024
CSS 17 Updated Dec 14, 2024

The code is a pingback to the Dark Vortex blog: https://0xdarkvortex.dev/hiding-memory-allocations-from-mdatp-etwti-stack-tracing/

C 165 33 Updated Jan 29, 2023

A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.

C 329 39 Updated Jun 3, 2024

A PoC implementation for dynamically masking call stacks with timers.

C++ 257 35 Updated Feb 13, 2023
Next