8000 DominicBreuker (Dominic Breuker) / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View DominicBreuker's full-sized avatar

Block or report DominicBreuker

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Collect Windows telemetry for Maldev

C++ 349 39 Updated Feb 8, 2025

A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…

YARA 883 101 Updated May 22, 2025

redirect all TCP/UDP traffic of any program to SOCKS5 proxy

Go 144 13 Updated Mar 2, 2024

"Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The tool would compress your binary (EXE/DLL) into 7z/zip file for…

Python 538 62 Updated Mar 10, 2025

Public open-source code of malware Stuxnet (aka MyRTUs).

C 1,072 171 Updated Aug 27, 2022

A terminal UI for tshark, inspired by Wireshark

Go 9,429 418 Updated Apr 30, 2024

A complete terminal user interface (TUI) for LDAP.

Go 645 22 Updated May 27, 2025

This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.

595 113 Updated May 27, 2025

SSH based reverse shell

Go 1,112 154 Updated May 19, 2025

ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries ever having to touch storage. This is useful for red-teamin…

Python 188 18 Updated Jan 3, 2024

A curated list of tools that can be used for creating interactive mathematical explorables.

212 13 Updated Oct 26, 2024

A suite of tools to disrupt campaigns using the Sliver C2 framework.

Python 275 20 Updated Aug 5, 2023

Decrypt encrypted Fortienet FortiOS firmware images

Python 124 29 Updated Aug 2, 2023

Jennifer is a code generator for Go

Go 3,497 162 Updated Sep 8, 2024

OSWE, OSEP, OSED, OSEE

3,180 657 Updated Apr 15, 2025

Create your own vulnerable by design AWS penetration testing playground

Python 375 42 Updated Apr 21, 2025

Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for m…

Python 460 59 Updated Dec 3, 2024

ScareCrow - Payload creation framework designed around EDR bypass.

Go 2,820 516 Updated Aug 18, 2023

An encyclopedia for offensive and defensive security knowledge in cloud native technologies.

Dockerfile 2,094 303 Updated May 7, 2025

Fast and customizable subdomain wordlist generator using DSL

Go 814 64 Updated Apr 16, 2025

Slack enumeration and exposed secrets detection tool

Python 379 43 Updated Dec 19, 2024

C++ WinRM API sliver extension

C++ 11 Updated Jun 27, 2023

A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.

552 116 Updated Mar 24, 2023

Transparent file encryption in git

C++ 8,860 491 Updated Sep 3, 2024

A collection of tools and detections for the Sliver C2 Frameworj

Python 126 10 Updated Apr 24, 2023

The Definitive Guide To Process Cloning on Windows

C 486 43 Updated Jan 3, 2024

Reverse engineering and pentesting for Android applications

Python 5,606 1,092 Updated Mar 26, 2025

FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE accesses.

Python 416 48 Updated Feb 11, 2025

GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or…

Go 585 115 Updated Mar 28, 2025

A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository…

1,004 114 Updated Jul 19, 2024
Next
0