Skip to content
View VasilisKosto's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report VasilisKosto

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Go 14,348 2,506 Updated Oct 6, 2025

Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM

C 42 2 Updated Dec 20, 2025

Mimikatz implementation in pure Python

Python 3,207 411 Updated Nov 11, 2025

🚀 Discover and explore a curated list of MCP servers, tools, and resources for AI assistants, enhancing your development and productivity.

8 2 Updated Dec 22, 2025

A curated list of awesome social engineering resources.

3,506 446 Updated Apr 5, 2023

A C# utility for interacting with SCOM

C# 89 12 Updated Dec 2, 2025

Password cracking rules for Hashcat based on statistics and industry patterns

1,525 316 Updated Jul 15, 2019

The Damn Vulnerable Router Firmware Project

HTML 703 148 Updated Apr 7, 2021

Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥

Python 7,123 1,141 Updated Aug 28, 2025

Proof of concept for Kerberos Armoring abuse.

Python 54 3 Updated Dec 12, 2025

PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.

PowerShell 29 5 Updated Dec 16, 2025

Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.

HTML 66 13 Updated Dec 10, 2025

C projects: algorithms, games, and networking

C 1,327 122 Updated Nov 24, 2025

A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-compatible, and built with evasion, anti-analysis and stability …

C++ 22 3 Updated Mar 7, 2025

A list of free and open forensics analysis tools and other resources

1,889 253 Updated Apr 20, 2025

Awesome EDR Bypass Resources For Ethical Hacking

1,418 140 Updated Oct 16, 2025

AV/EDR Evasion Lab for Training & Learning Purposes

C++ 3 Updated Feb 17, 2025

Custom certification report templates created with SysReptor.

HTML 2 Updated Jun 25, 2024

An improvised version of Sysreptor's default install script; specially made for debian linux distros like Kali linux to avoid installation errors.

Shell 1 Updated Jul 2, 2024

A YARA & Malware Analysis Toolkit written in Rust.

Rust 84 6 Updated Oct 7, 2025

Red Team Rust (Maldev)

57 9 Updated Nov 24, 2025

Lab used for workshop and CTF

PowerShell 387 41 Updated Dec 3, 2025

Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulations, including custom beacons, malleable C2 profiles, aggres…

C 76 9 Updated Nov 25, 2025

All the deals for InfoSec related software/tools this Black Friday

259 34 Updated Nov 28, 2025

All the deals for InfoSec related software/tools this Black Friday

4,293 536 Updated Nov 28, 2025

Snap Calculator provides data-driven insights and visual analytics to optimize your Marvel Snap game strategy.

Python 8 Updated Oct 30, 2023

A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualization techniques. Built to operate both as a standalone Powe…

PowerShell 56 11 Updated May 6, 2025

Hunt down social media accounts by username across social networks using httpx

Go 14 4 Updated Nov 6, 2025
Next