10000 0Nightsedge0 (Nightsedge) / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View 0Nightsedge0's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report 0Nightsedge0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.

C++ 766 77 Updated Jun 23, 2023

load shellcode without P/D Invoke and VirtualProtect call.

C# 12 1 Updated May 23, 2025

Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!

C# 485 51 Updated May 9, 2025

使深信服(Sangfor)开发的非自由的 VPN 软件 EasyConnect 和 aTrust 运行在 docker 或 podman 中,并作为网关和/或提供 socks5、http 代理服务

Shell 4,265 378 Updated Nov 27, 2024

Privilege Escalation Enumeration Script for Windows

PowerShell 3,307 467 Updated May 8, 2025

Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths

C++ 338 51 Updated Aug 11, 2024

.NET assembly loader with patching AMSI and ETW bypass

C 25 Updated Apr 16, 2025

This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim opens the phishing link and instantly redirects them to the …

Go 142 18 Updated Apr 24, 2025

dem sharp donuts

C# 197 39 Updated Sep 11, 2022

A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and reflection techniques for code injection. This PoC showcases…

C++ 295 44 Updated Mar 6, 2025

An example reference design for a proposed BOF PE

C++ 168 16 Updated Apr 17, 2025

Cobalt Strike BOF for evasive .NET assembly execution

C 250 33 Updated Mar 31, 2025

Hook system calls, context switches, page faults and more.

C++ 2,544 507 Updated May 9, 2023

Open-Source Shellcode & PE Packer

C 1,958 332 Updated Feb 3, 2024

An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution

C 187 29 Updated Nov 27, 2024

Reverse Engineering: Decompiling Binary Code with Large Language Models

Python 5,646 381 Updated May 29, 2025

bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)

Python 552 179 Updated Jul 15, 2024

Find potential DLL Sideloads on your windows computer

PowerShell 206 21 Updated Jan 12, 2025

A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…

YARA 892 102 Updated May 29, 2025

Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.

2,177 287 Updated Feb 24, 2023

Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies

C# 237 26 Updated Dec 27, 2024

A complete terminal user interface (TUI) for LDAP.

Go 649 22 Updated May 27, 2025

C# Based Universal API Unhooker

C# 402 80 Updated Feb 18, 2022

TCP Port Redirection Utility

C 723 114 Updated Jan 31, 2023

Syscall Shellcode Loader (Work in Progress)

Python 1,194 192 Updated May 8, 2024

A .NET Runtime for Cobalt Strike's Beacon Object Files

C 727 107 Updated Sep 4, 2024

Browser In The Browser (BITB) Templates

JavaScript 2,825 478 Updated Jan 26, 2024

Coverage-based fuzzer for python applications

Python 236 17 Updated Nov 4, 2022

IDA Signsrch

C 156 15 Updated Jul 14, 2015
Next
0