Skip to content
View mikesiegel's full-sized avatar

Highlights

  • Pro

Block or report mikesiegel

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
12 stars written in C++
Clear filter

Reverse engineering focusing on x64 Windows.

C++ 5,528 549 Updated Sep 10, 2025

Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).

C++ 3,471 464 Updated Oct 31, 2025

KLEE Symbolic Execution Engine

C++ 2,851 702 Updated Oct 28, 2025

A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.

C++ 2,679 484 Updated Dec 18, 2021

Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.

C++ 1,672 286 Updated Sep 25, 2025

A lightweight dynamic instrumentation library

C++ 1,289 127 Updated Apr 1, 2025

RpcView is a free tool to explore and decompile Microsoft RPC interfaces

C++ 1,012 256 Updated Sep 24, 2023

Fun with the Windows Subsystem for Linux (WSL/LXSS)

C++ 880 77 Updated Jan 29, 2019

Enumerate and disable common sources of telemetry used by AV/EDR.

C++ 812 129 Updated Mar 11, 2021

Custom Metasploit post module to executing a .NET Assembly from Meterpreter session

C++ 345 64 Updated Jul 21, 2020

A binary format analysis tool

C++ 244 22 Updated May 10, 2021

A simple header file to read Microsoft compound file with minimal efforts.

C++ 90 29 Updated Apr 14, 2025