Skip to content
View Cyb3r-Monk's full-sized avatar

Highlights

  • Pro

Organizations

@AppliedPurpleTeaming

Block or report Cyb3r-Monk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Adversary Simulation

Adversary simulations
10 repositories

AI-LLM

Promp engineering etc.
27 repositories

Attack Simulation and Automation

Attack simulation, detection engineering, purple teaming. etc.
36 repositories

Blue Team Tools

23 repositories

Data Science

20 repositories

Data Visualization

Interactive dashboarding etc.
4 repositories

DFIR

3 repositories

DFIR and Hunting Tools

Useful tools for threat hunting and DFIR
35 repositories
203 stars written in Python
Clear filter

In-depth ldap enumeration utility

Python 536 62 Updated Oct 23, 2025

Analyse your malware to surgically obfuscate it

Python 502 59 Updated May 29, 2025

Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for m…

Python 499 64 Updated Jul 25, 2025

Automated DLL Sideloading Tool With EDR Evasion Capabilities

Python 493 58 Updated Dec 19, 2023

BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse entities and configurable, traversable attack paths.

Python 476 30 Updated Nov 6, 2025

AWS CloudSaga - Simulate security events in AWS

Python 470 36 Updated Nov 10, 2025

SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative featur…

Python 469 67 Updated Jun 25, 2025

Learning Shodan through katas

Python 468 47 Updated Aug 7, 2020

Extract and execute a PE embedded within a PNG file using an LNK file.

Python 453 72 Updated Nov 2, 2024

Built-in Panther detection rules and policies

Python 426 191 Updated Nov 10, 2025

Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory

Python 399 42 Updated Aug 15, 2025

DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forensics, Incident Response, Malware Analysis and Threat Hunting.

Python 380 47 Updated Aug 11, 2025

A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Securit…

Python 377 82 Updated Nov 8, 2022

EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offers two modes of operation: automated and manual.

Python 374 52 Updated Apr 6, 2024

The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).

Python 342 28 Updated Nov 8, 2024

Assess the security of your Active Directory with few or all privileges.

Python 336 36 Updated Jun 4, 2025

Threat Hunting tool about Sysmon and graphs

Python 334 52 Updated May 28, 2023

Generate an obfuscated DLL that will disable AMSI & ETW

Python 329 44 Updated Jul 15, 2024

Lateral Movement Using DCOM and DLL Hijacking

Python 322 30 Updated Jun 18, 2023

Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.

Python 321 70 Updated Apr 12, 2024

A windows token impersonation tool

Python 318 42 Updated Apr 19, 2023

A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc

Python 317 64 Updated Aug 8, 2024

M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response capabilities.

Python 316 21 Updated Oct 12, 2025

Perfect DLL Proxying using forwards with absolute paths.

Python 307 32 Updated Nov 3, 2025
Python 275 37 Updated Jun 23, 2024

Weaponizing DCOM for NTLM Authentication Coercions

Python 272 24 Updated Jul 1, 2025

Execute commands interactively on remote Windows machines using the WinRM protocol

Python 272 23 Updated Oct 24, 2025

Group Policy Objects manipulation and exploitation framework

Python 269 29 Updated Oct 11, 2025

Pwnspoof repository

Python 265 32 Updated Sep 8, 2023