Skip to content
View screetsec's full-sized avatar
:shipit:
We live by the code and was raised by ethics
:shipit:
We live by the code and was raised by ethics

Organizations

@NgeSEC @bashidorg

Block or report screetsec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

windows-rs shellcode loaders

Rust 397 54 Updated Jul 11, 2024

[ BOF-LAUNCHER ] -> an API for loading, executing and in-memory masking BOFs on Windows and Linux for use in C/Zig/Go/Rust agents/implants. [ Z-BEAC0N ] -> a custom-written stage-1 (pre-C2) solutio…

Zig 313 29 Updated May 17, 2026

EDR Lab for Experimentation Purposes

C++ 1,451 152 Updated Mar 1, 2026

Tips on how to write exploit scripts (faster!)

572 110 Updated Jul 15, 2024

The Network Execution Tool

Python 5,521 705 Updated May 12, 2026

Materials for the workshop "Red Team Ops: Havoc 101"

C# 399 52 Updated Oct 6, 2024

A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting

PowerShell 824 126 Updated May 1, 2026

Situational Awareness commands implemented using Beacon Object Files

C 1,802 286 Updated Mar 10, 2026

ChatGPT for Mac, living in your menubar.

JavaScript 6,289 485 Updated Oct 23, 2023

This map lists the essential techniques to bypass anti-virus and EDR

3,259 359 Updated Mar 28, 2025

Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys

Python 660 89 Updated Feb 1, 2025

ThePhish: an automated phishing email analysis tool

Python 1,337 200 Updated Aug 1, 2024

Automating Host Exploitation with AI

Python 553 104 Updated Nov 8, 2022

A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass…

C 673 89 Updated Dec 23, 2022

Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点

Go 2,142 272 Updated Jan 29, 2024

A Modern Orchestration Engine for Security

Go 6,346 1,007 Updated May 11, 2026

Command and Control Framework written in C#

C# 429 63 Updated Jul 27, 2023

ManageEngine OpManager Decryption Tools

Python 32 2 Updated Sep 6, 2022

Parse OpenAPI documents into Burp Suite for automating OpenAPI-based APIs security assessments (approved by PortSwigger for inclusion in their official BApp Store).

Java 208 54 Updated Jan 3, 2024

finds publicly known security vulnerabilities in a website's frontend JavaScript libraries

JavaScript 2,024 126 Updated May 17, 2026

Project for tracking publicly disclosed DLL Hijacking opportunities.

907 114 Updated May 15, 2026

Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020

HTML 324 76 Updated Jan 22, 2021

Make URL path combinations using a wordlist

Go 173 28 Updated Sep 25, 2023

Abusing impersonation privileges through the "Printer Bug"

C 2,244 368 Updated Sep 10, 2020

Real-time face swap for PC streaming or video calls

Python 30,845 1,239 Updated Nov 8, 2024

A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.

Python 599 72 Updated Jan 31, 2025

事件驱动的渗透测试扫描器 Event-driven pentest scanner

Go 703 80 Updated Jul 7, 2024

HTTP Request Smuggling over HTTP/2 Cleartext (h2c)

Python 792 118 Updated May 10, 2022
Next