Skip to content
View Ondrik8's full-sized avatar
👽
He11oW Darkn3s5
👽
He11oW Darkn3s5

Block or report Ondrik8

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

48 results for source starred repositories written in C
Clear filter

Defeating Windows User Account Control

C 7,110 1,398 Updated Jul 8, 2025

Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

C 4,286 716 Updated Jul 8, 2025

A post exploitation framework designed to operate covertly on heavily monitored environments

C 2,160 336 Updated Sep 29, 2021

SSH man-in-the-middle tool

C 1,723 211 Updated Jul 2, 2021

Situational Awareness commands implemented using Beacon Object Files

C 1,613 263 Updated Oct 22, 2025

CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost

C 1,341 342 Updated Dec 7, 2020

HVNC for Cobalt Strike

C 1,278 196 Updated Dec 7, 2023

C/C++ source obfuscator for antivirus bypass

C 1,060 190 Updated Mar 10, 2022

Cobalt Strike UDRL for memory scanner evasion.

C 985 168 Updated Jun 4, 2024

Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, advanced methods, and efficient sniffers. Ideal for cybersecur…

C 929 451 Updated Oct 3, 2024

Cobalt Strike Aggressor 插件包

C 673 99 Updated Aug 31, 2021

Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file

C 671 121 Updated Mar 11, 2024

Windows Elevation(持续更新)

C 660 167 Updated Feb 19, 2022

Quickly debug shellcode extracted during malware analysis

C 614 87 Updated May 23, 2023

绕3环的shellcode免杀框架

C 574 155 Updated Mar 19, 2021

Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging

C 570 84 Updated Mar 8, 2024

Exploiting DLL Hijacking by DLL Proxying Super Easily

C 539 107 Updated Jul 9, 2023

Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Mi…

C 493 99 Updated May 16, 2023

Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (AC…

C 468 72 Updated Mar 8, 2023

A shellcode function to encrypt a running process image when sleeping.

C 343 58 Updated Sep 11, 2021

Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components

C 271 40 Updated Aug 4, 2021

Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.

C 259 80 Updated Mar 30, 2022

Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File

C 213 33 Updated Oct 8, 2020

Privilege Escalation Via RpcSs svc

C 181 34 Updated Dec 10, 2021

Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.

C 181 26 Updated Feb 11, 2021

Reflective DLL loading of your favorite Golang program

C 172 21 Updated Jan 27, 2020

Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.

C 154 23 Updated Sep 3, 2020

A simple tool to convert the IP to a DWORD IP

C 140 45 Updated Jul 29, 2022
Next