Skip to content
View mertdas's full-sized avatar

Block or report mertdas

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Mask the trail, keep the scent. AnonymousHound anonymizes sensitive data within BloodHound exports (users, groups, PKI, etc.) ensuring PII is scrubbed, but the full map of security vulnerabilities …

PowerShell 25 1 Updated Oct 14, 2025

Project for generating and identifying deceptive LNK files.

Python 313 43 Updated Mar 8, 2026
C++ 82 17 Updated Apr 28, 2025

Local Privilege Escalation Affecting Millions of Gaming Laptops

C++ 62 9 Updated Jan 19, 2026

COM Hijacking VOODOO

C 378 59 Updated Nov 27, 2025

A Dockerized build pipeline for custom Windows x64 shellcode

Python 53 8 Updated Dec 12, 2025

Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and penetration testing

PowerShell 115 24 Updated Mar 6, 2026

A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.

Go 135 16 Updated Nov 12, 2025

Your template-based BloodHound terminal companion tool

Python 448 36 Updated Jan 21, 2026

Proof of Concepts code for Bring Your Own Vulnerable Driver techniques

C 97 26 Updated Aug 21, 2025

Exploitable drivers, you know what I mean

152 27 Updated Nov 16, 2025

Local SYSTEM auth trigger for relaying - X

C 154 16 Updated Jul 23, 2025

Aggressor script add-in for CobaltStrike to track file uploads

48 8 Updated Nov 7, 2022

A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader

C 45 6 Updated Sep 25, 2024

onedrive user enumeration - pentest tool to enumerate valid o365 users

Python 748 93 Updated Jul 29, 2025

Updated version of a long known self deletion technique to work with 24H2.

C 61 3 Updated Jun 9, 2025

Python3 utility for creating zip files that smuggle additional data for later extraction

Python 267 28 Updated May 15, 2025

Linker for Beacon Object Files

Rust 172 15 Updated Mar 30, 2026

SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.

C# 396 64 Updated Sep 26, 2025

Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit

C++ 63 14 Updated Feb 2, 2026

BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).

Rust 664 99 Updated Feb 24, 2026

Rid_enum is a null session RID cycle attack for brute forcing domain controllers.

Python 307 88 Updated Jul 28, 2024

Less sugar (entropy) for your binaries

Go 33 5 Updated Sep 10, 2025

PrivCheck is a collection of Beacon Object Files designed to detect privilege escalation vulnerabilities in Windows OS by identifying common misconfigurations.

C 9 Updated Jan 31, 2025

Tool for Active Directory Certificate Services enumeration and abuse

Python 165 19 Updated Apr 17, 2025

A list of resources for those interested in getting started in bug bounties

11,928 2,043 Updated Jul 23, 2024

Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and scripts have been written and published, but they can be cha…

CSS 408 29 Updated Apr 2, 2026

Cobalt Strike系列

2,418 594 Updated Dec 3, 2023

A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies

34 7 Updated Sep 15, 2022
Next