Skip to content
View chr0n1k's full-sized avatar

Block or report chr0n1k

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Vulnerable applications lab — 11 CVEs, Docker-based

Shell 2 Updated Apr 15, 2026

The Phantom Whisper is a sophisticated, production-grade Python orchestration framework designed to deploy zero-click exploits with surgical precision.

Python 16 3 Updated Aug 1, 2025
PowerShell 66 4 Updated Apr 16, 2026
Python 429 61 Updated Apr 17, 2026

The Red Sun vulnerability repository

C++ 1,327 288 Updated Apr 15, 2026

Dynamic Device Phishing tool that creates a new code only when user clicks on link or email is sent.

Python 9 1 Updated Apr 12, 2026

A golang-written credential harvesting framework leveraging eBPF for kernel-level monitoring with anti-detection capabilities.

Go 20 3 Updated Apr 13, 2026

Phantom-Evasion-Loader is a standalone, pure x64 Assembly injection engine engineered to minimize the detection surface of modern EDR/XDR solutions and Kernel-level monitors like Falco (eBPF). It l…

Assembly 65 9 Updated Apr 15, 2026

Monitor the Windows Event Log with grep-like features or filtering for specific Event IDs

Python 118 8 Updated Mar 26, 2026

A Cobalt Strike BOF implementation of the SilentHarvest registry dumping technique

C 129 12 Updated Apr 14, 2026

This is a simple modbus server that can be used for attack simulations.

Python 1 Updated Apr 8, 2026

Elastic Security detection content for Endpoint

YARA 1,409 158 Updated Apr 13, 2026

Live ETW-TI event viewer for Windows kernel threat-intelligence telemetry. Research tool for exploring the same signals commercial EDRs rely on.

C++ 118 15 Updated Apr 15, 2026

Tailscale-based Windows VNC persistence tool with Session 0 isolation bypass, embedding a full WireGuard peer and RFB server into a single drop-in binary.

Go 238 24 Updated Apr 11, 2026

Offset Independent Credential Extraction Tool

C# 21 2 Updated Sep 2, 2025

Proof-of-concept implementation of AI-enabled postex DLLs

C++ 70 8 Updated Sep 10, 2025

Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by BeichenDream.

C 190 21 Updated Apr 16, 2026

A stealthy loader for shellcode staged with http/https like Sliver

C 35 5 Updated Apr 16, 2026

Run PowerShell command without invoking powershell.exe

Python 23 2 Updated Apr 9, 2026

This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots.

C++ 109 8 Updated Apr 8, 2026

VeilCreds, a hidden PAM credential harvester

C 20 5 Updated Apr 2, 2026

Repository hosting the bluehammer vulnerability

C 1,518 563 Updated Apr 9, 2026

C2

147 39 Updated Dec 29, 2025

Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)

Nim 96 10 Updated Apr 4, 2026

NTLM HTTP relay tool with SOCKS proxy for browser session hijacking

Python 140 8 Updated Apr 6, 2026

Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable API calls.

C 105 8 Updated Apr 1, 2026

Fancy reverse and bind shell handler

Python 47 10 Updated Apr 2, 2026

The samples referenced in my book, Evasive Malware (No starch Press)

59 10 Updated Feb 20, 2026
Next