Skip to content
View Infinit3i's full-sized avatar
:shipit:
red teaming
:shipit:
red teaming

Block or report Infinit3i

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.

C 355 46 Updated Feb 10, 2025

A post-exploitation powershell tool for extracting juicy info from memory.

PowerShell 1,861 334 Updated Jun 28, 2024

LKM rootkit for modern kernels (6x)

C 249 37 Updated Oct 8, 2025

Lightweight, memory-safe, zero-allocation library for reading and navigating PE binaries.

Rust 327 51 Updated Aug 22, 2025

A COFF loader made in Rust

Rust 312 49 Updated Aug 20, 2025

A browser extension for OSINT search

TypeScript 1,682 170 Updated Oct 5, 2025

Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools

Python 268 18 Updated Sep 18, 2025

Cheat sheet to detect and remove linux kernel rootkit

73 12 Updated Dec 16, 2024

A machine learning tool that ranks strings based on their relevance for malware analysis.

Python 740 125 Updated May 19, 2025

This code unhooks EDR Windows API calls and dumps the LSASS process

1 Updated Feb 15, 2024
Rust 1 1 Updated Jan 5, 2025

Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide

C++ 3,849 465 Updated Jun 4, 2024

AV/EDR evasion via direct system calls.

Assembly 1,933 270 Updated Jan 1, 2023

A repository of sysmon configuration modules

PowerShell 2,879 635 Updated Aug 21, 2024

The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

C 210 25 Updated Jan 20, 2024

Detection Wizard brings YARA, Suricata, Sigma, Sysmon, QRadar, Splunk, and IOCs into one powerful interface for powerful rule management and threat detection.

Rust 4 Updated Aug 12, 2025

Search a filesystem for indicators of compromise (IoC).

Python 81 14 Updated Oct 8, 2025

✒️ Adding digital signature into ELF binary files.

C 55 15 Updated Nov 17, 2021

DNS Tunneling using powershell to download and execute a payload. Works in CLM.

Python 229 37 Updated May 24, 2022

NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other mean…

C++ 228 22 Updated Oct 6, 2025

OWASP Web Application Security Testing Checklist

2,002 397 Updated Aug 18, 2022

Powershell Based tool for gathering information related to O365 intrusions and potential Breaches

PowerShell 889 136 Updated Mar 7, 2025

A fast, simple, recursive content discovery tool written in Rust.

Rust 7,013 555 Updated Oct 4, 2025

Windows Local Privilege Escalation Cookbook

PowerShell 1,189 189 Updated Jan 20, 2025

Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antivirus. Built in Rust.

Rust 376 43 Updated Oct 9, 2025

BloodyAD is an Active Directory Privilege Escalation Framework

Python 1,931 182 Updated Oct 9, 2025

RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.

C++ 291 21 Updated Sep 3, 2023

RDP Bitmap Cache parser

Python 571 93 Updated Jan 21, 2025
Next