Skip to content
View m40L0ng's full-sized avatar

Block or report m40L0ng

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Bypass LSA protection using the BYODLL technique

C 178 42 Updated Sep 21, 2024

A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.

C++ 170 24 Updated May 30, 2024

I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning path for me.

C++ 287 33 Updated Aug 1, 2025
Python 126 36 Updated Mar 20, 2024

Open-source URL masking & analysis tool for security research, phishing awareness, and defensive testing. Demonstrates adversary techniques used to disguise malicious links.

Python 484 69 Updated Jan 6, 2026

A swiss army knife for pentesting networks

Python 9,128 1,689 Updated Dec 6, 2023

RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.

1,909 311 Updated Oct 29, 2025

Códigos soltos usados em respostas minhas no Stack Overflow em português

C# 2,092 191 Updated Apr 1, 2025

Collection of Cyber Threat Intelligence sources from the deep and dark web

6,818 1,149 Updated Apr 24, 2026

🦙 LaMa Image Inpainting, Resolution-robust Large Mask Inpainting with Fourier Convolutions, WACV 2022

Jupyter Notebook 2 Updated Apr 21, 2022

Notion as a platform for offensive operations

Rust 1,175 130 Updated May 21, 2023

Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.

Python 486 41 Updated Jul 9, 2024

CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.

C# 1,400 320 Updated Dec 16, 2021

Collection of malware source code for a variety of platforms in an array of different programming languages.

Assembly 18,010 2,021 Updated Sep 10, 2025

A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228

Python 3,431 728 Updated Nov 23, 2022

Malware development for red teaming workshop

C# 225 43 Updated Nov 15, 2021

Repositório com conteúdo sobre web hacking em português

38 4 Updated Jun 10, 2021

D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects

PowerShell 255 46 Updated Oct 13, 2020

HTA encryption tool for RedTeams

Python 1,425 250 Updated Nov 9, 2022

A helpful Java Deserialization exploit framework.

Java 1,241 149 Updated Feb 17, 2025

🌸 A command-line fuzzy finder

Go 79,832 2,792 Updated Apr 27, 2026

All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities

Java 803 177 Updated Nov 7, 2021
Java 318 51 Updated Jun 4, 2021

Cnvd-2020-10487 / cve-2020-1938, scanner tool

Python 295 95 Updated Nov 26, 2021

Apache Solr Exploits 🌟

347 57 Updated Oct 13, 2020
Python 117 38 Updated Apr 14, 2020

CVE-2019-0230 & s2-059 poc.

35 17 Updated Aug 21, 2020
Next