Skip to content
View Cyb3r-Monk's full-sized avatar

Highlights

  • Pro

Organizations

@AppliedPurpleTeaming

Block or report Cyb3r-Monk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Adversary Simulation

Adversary simulations
10 repositories

AI-LLM

Promp engineering etc.
36 repositories

Attack Simulation and Automation

Attack simulation, detection engineering, purple teaming. etc.
36 repositories

Blue Team Tools

25 repositories

Data Science

20 repositories

Data Visualization

Interactive dashboarding etc.
4 repositories

DFIR

3 repositories

DFIR and Hunting Tools

Useful tools for threat hunting and DFIR
35 repositories
Showing results

Go (formerly PowerShell) collector for adding MSSQL attack paths to BloodHound with OpenGraph

Go 316 19 Updated Apr 23, 2026
Python 30 Updated Apr 22, 2026

One WSL BOF to rule them all

C 175 13 Updated Jan 14, 2026

Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.

C 115 7 Updated Apr 22, 2026

LadybugDB a graph database

C++ 1,034 75 Updated Apr 28, 2026

This operational dashboard correlates data from Microsoft Defender for Endpoint/Server (MDE) and Azure Monitor Agent (AMA) to identify configuration gaps and ensure complete endpoint telemetry inge…

11 5 Updated Apr 18, 2026

Live ETW-TI event viewer for Windows kernel threat-intelligence telemetry. Research tool for exploring the same signals commercial EDRs rely on.

C++ 139 20 Updated Apr 15, 2026

Creating attacks paths across management and data planes

Rust 50 2 Updated Apr 28, 2026

Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by BeichenDream.

C 216 29 Updated Apr 16, 2026

Machine Learning Pipelines introduced for cyber threat hunting purposes.

Jupyter Notebook 2 Updated Apr 9, 2026

A stealthy loader for shellcode staged with http/https like Sliver

C 2 Updated Apr 9, 2026

A Beacon Object File suite for Microsoft SQL Server that speaks TDS 7.4 on the wire itself

C 93 6 Updated Apr 9, 2026

Combining KslDump and GhostKatz to dump LSASS using no-fix KslD.sys memory read to bypass PPL. Extracts MSV1_0 NT hashes and WDigest cleartext passwords (if enabled) from LSASS using a Microsoft-si…

C++ 39 12 Updated Mar 27, 2026

NTLM HTTP relay tool with SOCKS proxy for browser session hijacking

Python 152 8 Updated Apr 6, 2026

An open-source log viewer inspired by Microsoft's CMTrace.exe.

Rust 184 8 Updated Apr 28, 2026

BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation

C 126 7 Updated Mar 27, 2026

psexecsvc - a python implementation of PSExec's native service implementation

Python 301 31 Updated Mar 24, 2026

Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later

Go 126 7 Updated May 9, 2023

An automation framework for deploying Microsoft Sentinel environments using pipelines. This project combines infrastructure-as-code (Bicep) with PowerShell automation to streamline the deployment o…

PowerShell 43 23 Updated Mar 23, 2026
C 208 33 Updated Mar 15, 2026

Extract Windows credentials directly from VM memory snapshots and virtual disks

Rust 1,175 131 Updated Apr 18, 2026

kerberos in rust for fun and profit

Rust 72 6 Updated Mar 13, 2026

Library of BOFs to interact with SQL servers

C 232 30 Updated Dec 3, 2025
ASP.NET 1 Updated Mar 10, 2026

Patch termsrv.dll so that multiple remote users can open an RDP session on a non-Windows Server computer

PowerShell 480 67 Updated Mar 2, 2026

ASPX Web Shell with COFF Loader

ASP.NET 129 20 Updated Mar 10, 2026

Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens

PowerShell 209 27 Updated Mar 4, 2026

Structured RAG: ingest, index, query

Python 814 71 Updated Apr 28, 2026
Next