Skip to content
View T4TCH3R's full-sized avatar
😵
😵

Block or report T4TCH3R

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

The Havoc Framework

Go 8,150 1,167 Updated Dec 18, 2025

Powershell tool to automate Active Directory enumeration.

PowerShell 1,279 151 Updated Sep 9, 2025

A set of fully-undetectable process injection techniques abusing Windows Thread Pools

C++ 1,244 172 Updated Dec 11, 2023

Shellcode Loader with Indirect Dynamic syscall Implementation , shellcode in MAC format, API resolving from PEB, Syscall calll and syscall instruction address resolving at run time

C++ 323 68 Updated Aug 2, 2023

You shall pass

PowerShell 271 52 Updated Jul 16, 2022

Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic look legit.

Python 270 48 Updated Jan 18, 2023

Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic look legit.

Python 25 1 Updated Jan 23, 2023

.NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.

C# 22 16 Updated Aug 13, 2018

Generate possible AD usernames from names like John Doe > J.Doe or JDoe

Go 6 Updated Jan 4, 2022