Skip to content
View EvilEnigma's full-sized avatar
💭
Work in Progress
💭
Work in Progress

Block or report EvilEnigma

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Defanged malware stages from the litellm 1.82.8 PyPI supply chain compromise — credential stealer, K8s lateral movement, C2 backdoor

Python 39 6 Updated Mar 24, 2026

Fake recaptcha (Phishing)

HTML 1 Updated Apr 20, 2025

A tool for pointesters to find candies in SharePoint

C# 282 26 Updated Nov 4, 2022

.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation

C# 400 45 Updated Jul 23, 2025

GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or…

Go 640 120 Updated Mar 28, 2025

DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely

C++ 383 54 Updated Dec 13, 2024

A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit

Rust 117 14 Updated Aug 9, 2024

Collection of Offensive C# Tooling

C# 1,470 256 Updated Feb 6, 2023

Stealthily inject shellcode into an executable

Python 459 79 Updated Oct 19, 2025

Dump cookies and credentials directly from Chrome/Edge process memory

C 1,431 137 Updated Apr 9, 2026

shellcodeloader

C++ 1,749 385 Updated Dec 11, 2020

BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions

C++ 348 40 Updated Nov 19, 2024

RDL的堆溢出导致的RCE

Python 223 89 Updated Aug 14, 2024

Exploit for the CVE-2024-5806

Python 45 4 Updated Jun 24, 2024

.NET AWS lambda function for redirecting traffic to a cobaltstrike C2 server

C# 2 1 Updated Feb 15, 2022

Automated AWS serverless infrastructure for Red Team C2 redirectors

Python 2 1 Updated Aug 18, 2021

A script that can be deployed to Azure App for C2 / Proxy / Redirector

Python 41 5 Updated May 17, 2019

Leveraging AWS Lambda Function URLs for C2 Redirection

Python 46 10 Updated Aug 30, 2023

Obuscated C Christmas programs

C 378 27 Updated Jun 23, 2022

OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.

C# 818 151 Updated Oct 27, 2023

the only cheat sheet you need

Python 41,193 1,904 Updated Dec 23, 2025

Companion content for my 'Fun with Office Macros' webcast.

VBA 25 11 Updated Apr 18, 2024

Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.

Python 328 70 Updated Apr 12, 2024

tools for shellcoding

C 7 2 Updated Feb 7, 2015

AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.

C# 236 48 Updated Feb 15, 2021

TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts

C# 1,376 150 Updated Mar 9, 2026

A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass…

C 673 89 Updated Dec 23, 2022

PoC for UUID shellcode execution using DInvoke

C# 155 26 Updated Mar 8, 2021

Hardened Proof of Concept of D/Invoke Process Injection malware

C# 42 6 Updated Jul 23, 2020
Next