Stars
RogueMaster Flipper Zero Firmware
Low-level unprivileged sandboxing tool used by Flatpak and similar projects
Simple (relatively) things allowing you to dig a bit deeper than usual.
Windows Privilege Escalation from User to Domain Admin.
Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in user mode, no admin rights required.
A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.
Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.
MDM patch *should* working on iOS 15+...
A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.
Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for security professionals and enthusiasts.
Reflective shellcode loaderwith advanced call stack spoofing and .NET support.
🔥📜 Forbidden collection of Red Team sorcery 📜🔥
SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…
A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass
Local SYSTEM auth trigger for relaying - X
Injecting DLL into LSASS at boot
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
UAC Bypass using UIAccess program QuickAssist
Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust
My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to anyone's system.
Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when attackers disable standard process notify callbacks.
Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussions/15
PoC code of Shade BIOS (stripped) presented at Black Hat USA 2025
Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hooks.