Skip to content
View SkyBulk's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report SkyBulk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
80 stars written in C
Clear filter

Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

C 14,266 2,084 Updated Dec 17, 2025

darktable is an open source photography workflow application and raw developer

C 11,735 1,254 Updated Dec 17, 2025

Defeating Windows User Account Control

C 7,197 1,404 Updated Dec 14, 2025

🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)

C 3,184 692 Updated Feb 15, 2023

generate CobaltStrike's cross-platform payload

C 2,519 374 Updated Nov 20, 2023

Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).

C 2,280 284 Updated Oct 31, 2025

Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.

C 2,049 456 Updated Dec 1, 2025

Open-Source Shellcode & PE Packer

C 2,040 334 Updated Feb 3, 2024

🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc

C 1,989 508 Updated Jul 13, 2022

LoadLibrary for offensive operations

C 1,169 209 Updated Oct 22, 2021

Collection of PoC and offensive techniques used by the BlackArrow Red Team

C 1,143 189 Updated Jul 19, 2024

C/C++ source obfuscator for antivirus bypass

C 1,059 191 Updated Mar 10, 2022

A protective and Low Level Shellcode Loader that defeats modern EDR systems.

C 917 143 Updated Mar 20, 2024

Demos of various injection techniques found in malware

C 795 189 Updated Feb 15, 2022

AV Evasion Tool For Red Team Ops

C 769 150 Updated Dec 8, 2021

PoC exploits for software vulnerabilities

C 683 157 Updated Aug 21, 2021

Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file

C 674 122 Updated Mar 11, 2024

Windows 10 UAC bypass for all executable files which are autoelevate true .

C 647 115 Updated Dec 9, 2019

Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams

C 621 81 Updated Oct 6, 2025

Basically a script thrift shop

C 590 126 Updated Dec 18, 2022

Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging

C 579 84 Updated Mar 8, 2024

exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House

C 452 116 Updated Nov 7, 2025

neural network assisted fuzzer

C 411 105 Updated May 24, 2020

BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released at BSides Cymru 2023.

C 390 56 Updated Jan 9, 2024

Exercises for learning Reverse Engineering and Exploitation.

C 388 54 Updated Mar 1, 2019

Some ways to inject a DLL into a alive process

C 364 115 Updated Apr 26, 2018
Next