Skip to content
View KathanP19's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report KathanP19

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

My Notes about Penetration Testing

PowerShell 729 169 Updated Jan 17, 2026

Documents Exfiltration project for fun and educational purposes

C++ 144 30 Updated Oct 10, 2023

Apple BLE proximity pairing message spoofing

Python 1,861 151 Updated Jun 17, 2024

Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.

C++ 407 72 Updated Aug 22, 2023

Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

C 747 107 Updated May 23, 2025

PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.

Python 68 13 Updated Dec 26, 2024

Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI, scans SMB/NFS shares for passwords, scans for remote access…

Python 18 1 Updated Sep 23, 2023

A collection of PoCs for different injection techniques on Windows!

C 49 3 Updated Aug 27, 2023

SIEM Cheat Sheet

80 22 Updated Aug 15, 2023

Offensive Software Exploitation Course

Python 2,392 387 Updated May 31, 2023

Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table

C++ 305 47 Updated Aug 2, 2023

Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, and reverting back memory protections and original memory state

C++ 185 35 Updated Aug 2, 2023

A running list of Windows sources and the related event ids.

19 Updated Aug 2, 2023

Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound

Python 670 60 Updated Oct 23, 2025

Threat Hunting query in Microsoft 365 Defender, XDR. Provide out-of-the-box KQL hunting queries - App, Email, Identity and Endpoint.

484 86 Updated Nov 22, 2024

Rust in-memory dumper

Rust 108 17 Updated Jul 26, 2023

Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon Open Dataset for Malware AnalysiS.

Python 92 18 Updated Mar 31, 2024
JavaScript 102 13 Updated Sep 10, 2025

HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys th…

Python 143 27 Updated Jun 20, 2022

BlackLotus UEFI Windows Bootkit

C 2,184 478 Updated Mar 28, 2024

Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing

393 78 Updated Jun 15, 2023

Native Syscalls Shellcode Injector

C 266 44 Updated Jul 2, 2023

This map lists the essential techniques to bypass anti-virus and EDR

3,144 347 Updated Mar 28, 2025

Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.

C++ 783 77 Updated Jun 23, 2023

A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interac…

Go 115 9 Updated Dec 8, 2025

A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact dire…

Go 679 75 Updated Dec 8, 2025

GPT 3.5/4 with a Chat Web UI. No API key required.

Python 5,671 1,235 Updated Sep 26, 2023

Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctypes

Python 128 13 Updated Sep 27, 2023

Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume threads

C++ 166 28 Updated Aug 2, 2023

kill anti-malware protected processes ( BYOVD )

C++ 968 151 Updated Jul 21, 2023
Next