Skip to content
View Cyb3r-Monk's full-sized avatar

Highlights

  • Pro

Organizations

@AppliedPurpleTeaming

Block or report Cyb3r-Monk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Adversary Simulation

Adversary simulations
10 repositories

AI-LLM

Promp engineering etc.
36 repositories

Attack Simulation and Automation

Attack simulation, detection engineering, purple teaming. etc.
36 repositories

Blue Team Tools

25 repositories

Data Science

20 repositories

Data Visualization

Interactive dashboarding etc.
4 repositories

DFIR

3 repositories

DFIR and Hunting Tools

Useful tools for threat hunting and DFIR
35 repositories
Showing results

This operational dashboard correlates data from Microsoft Defender for Endpoint/Server (MDE) and Azure Monitor Agent (AMA) to identify configuration gaps and ensure complete endpoint telemetry inge…

10 5 Updated Apr 18, 2026

Live ETW-TI event viewer for Windows kernel threat-intelligence telemetry. Research tool for exploring the same signals commercial EDRs rely on.

C++ 122 16 Updated Apr 15, 2026

Creating attacks paths across management and data planes

Rust 29 1 Updated Apr 13, 2026

Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by BeichenDream.

C 193 23 Updated Apr 16, 2026

Machine Learning Pipelines introduced for cyber threat hunting purposes.

Jupyter Notebook 2 Updated Apr 9, 2026

A stealthy loader for shellcode staged with http/https like Sliver

C 2 Updated Apr 9, 2026

A Beacon Object File suite for Microsoft SQL Server that speaks TDS 7.4 on the wire itself

C 67 4 Updated Apr 9, 2026

Combining KslDump and GhostKatz to dump LSASS using no-fix KslD.sys memory read to bypass PPL. Extracts MSV1_0 NT hashes and WDigest cleartext passwords (if enabled) from LSASS using a Microsoft-si…

C++ 38 12 Updated Mar 27, 2026

NTLM HTTP relay tool with SOCKS proxy for browser session hijacking

Python 141 8 Updated Apr 6, 2026

An open-source log viewer inspired by Microsoft's CMTrace.exe.

Rust 179 8 Updated Apr 18, 2026

BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation

C 124 5 Updated Mar 27, 2026

psexecsvc - a python implementation of PSExec's native service implementation

Python 299 31 Updated Mar 24, 2026

Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later

Go 126 7 Updated May 9, 2023

An automation framework for deploying Microsoft Sentinel environments using pipelines. This project combines infrastructure-as-code (Bicep) with PowerShell automation to streamline the deployment o…

PowerShell 43 23 Updated Mar 23, 2026
C 198 30 Updated Mar 15, 2026

Extract Windows credentials directly from VM memory snapshots and virtual disks

Rust 1,053 111 Updated Apr 18, 2026

kerberos in rust for fun and profit

Rust 70 5 Updated Mar 13, 2026

Library of BOFs to interact with SQL servers

C 231 30 Updated Dec 3, 2025
ASP.NET 1 Updated Mar 10, 2026

Patch termsrv.dll so that multiple remote users can open an RDP session on a non-Windows Server computer

PowerShell 471 67 Updated Mar 2, 2026

ASPX Web Shell with COFF Loader

ASP.NET 129 20 Updated Mar 10, 2026

Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens

PowerShell 186 18 Updated Mar 4, 2026

Structured RAG: ingest, index, query

Python 809 69 Updated Apr 14, 2026

Orchestrate fleets of Claude Code & Claude Computer Use agents across containers, VMs, and physical devices. Live desktop streaming, intelligent task delegation, and multi-channel human-in-the-loop…

Python 123 9 Updated Mar 11, 2026

This repo, focuses on detection engineering for Kubernetes Cluster. Sysdig Falco is used to create rules.

2 Updated Mar 1, 2026
TypeScript 4,376 645 Updated Apr 16, 2026

Azure apim mini proxy

Python 56 6 Updated Feb 16, 2026

High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 487 detection rules with live credential validation.

Go 516 51 Updated Apr 19, 2026
Next