Skip to content
View shelld0n's full-sized avatar

Block or report shelld0n

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.

Python 297 38 Updated Mar 8, 2022

Collection of beacon BOF written to learn windows and cobaltstrike

C++ 346 57 Updated Feb 24, 2023

a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )

C# 2,286 230 Updated Feb 13, 2025

A script that helps you understand why your E-Mail ended up in Spam

Python 603 88 Updated Jun 27, 2023

A set of fully-undetectable process injection techniques abusing Windows Thread Pools

C++ 1,073 144 Updated Dec 11, 2023

An OOB interaction gathering server and client library

Go 3,648 385 Updated Mar 17, 2025

Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …

Go 22,599 2,644 Updated Mar 17, 2025

Stealing Signatures and Making One Invalid Signature at a Time

Python 2,198 472 Updated Aug 11, 2021

The SpecterOps project management and reporting engine

Python 1,456 195 Updated Mar 20, 2025

Convert Cobalt Strike profiles to modrewrite scripts

Python 594 118 Updated Jan 30, 2023

Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation

Python 955 143 Updated Oct 7, 2022

Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.

JavaScript 9,642 2,822 Updated Mar 21, 2025

A fast TCP/UDP tunnel over HTTP

Go 14,281 1,456 Updated Sep 28, 2024

Defeating Windows User Account Control

C 6,651 1,341 Updated Mar 9, 2025

Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors

PowerShell 152 43 Updated Jan 7, 2019

Support ALL Windows Version

C++ 716 173 Updated Sep 11, 2020

Double-Free BUG in WhatsApp exploit poc.

C 96 36 Updated May 10, 2020

MSBuild Without MSBuild.exe

C# 156 50 Updated Dec 21, 2020

Identifies the bytes that Microsoft Defender flags on.

C# 2,413 433 Updated Sep 14, 2023

Basically a script thrift shop

C 587 126 Updated Dec 18, 2022

A tool to elevate privilege with Windows Tokens

C# 1,036 201 Updated Oct 6, 2023

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

PowerShell 4,442 590 Updated Mar 19, 2025

PowerShell Pass The Hash Utils

PowerShell 1,556 305 Updated Dec 9, 2018

Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.

2,090 282 Updated Feb 24, 2023
PHP 7 3 Updated Mar 24, 2024

An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

Boo 2,236 411 Updated Dec 6, 2023

A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.

907 120 Updated Jul 25, 2019

Find vulnerabilities in AD Group Policy

641 82 Updated Mar 25, 2022
Next