Skip to content
View mrpnkt's full-sized avatar
💭
meh
💭
meh

Block or report mrpnkt

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Proof-of-Concept of the CVE-2025-9491 using invisible characters in the arguments of a Windows shortcut file (.lnk)

Python 17 6 Updated Nov 7, 2025

Colloid icon theme for linux desktops

Shell 949 63 Updated Nov 10, 2025

Omarchy theme based on japanese culture.

Lua 36 1 Updated Oct 11, 2025

Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.

HTML 66 13 Updated Dec 10, 2025

DLL hijacking vulnerability scanner and PE infector tool

21 16 Updated Sep 8, 2017

for education purpose only

Python 1 Updated Jun 13, 2025

OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.

20 1 Updated Nov 9, 2023

Fabric is an open-source framework for augmenting humans using AI. It provides a modular system for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.

Go 36,030 3,652 Updated Dec 22, 2025

Thief-Cat is a versatile stealer built with Python, Node.js, and C# that boasts ultra-low detection rates. Its user interface is designed for clarity and ease of use, making it accessible for devel…

1 Updated Jun 21, 2025

Chrome InfoStealer for apple silicon macOS that can retrieve cookie, credentials, and credit carddata. This tool works local only, so not illegal model.

Go 8 Updated Dec 19, 2025

Path traversal tool based on cve-2025-8088

Python 32 14 Updated Dec 1, 2025

a python PoC for the CVE-2019-15949

Python 2 Updated Nov 26, 2025

PoC Lab for CVE-2025-32421 – Next.js Race Condition Cache Poisoning Simulation

JavaScript 2 Updated Nov 26, 2025

Tutorial of CVE-2022-37969 with focus on the methodology of Kernel exploitation, not CVE's internal causes

C++ 1 Updated Nov 25, 2025

Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-native executables.

PowerShell 257 42 Updated Apr 14, 2025

Argfuscator is a tool used to randomize and obfuscate PowerShell command-line arguments.

Python 11 3 Updated Jul 2, 2017

POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's stdin command invocation capabilities

PowerShell 105 33 Updated Jul 2, 2017

Hands‑on analysis of CVE‑2025‑62215, a Windows Kernel race condition exploited in the wild. Demonstrates privilege escalation to SYSTEM, detection scripts, and patch validation strategies for enter…

3 1 Updated Nov 18, 2025

Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war, apk, ipa, ...) archives

Python 112 6 Updated May 24, 2025

script for generating a macro that can be embedded in an MS Office document to load the payload.

Python 4 Updated Nov 7, 2025

Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens

Python 28 7 Updated Dec 3, 2020

Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.

Shell 61 10 Updated Nov 14, 2025

Black Obsidian is a next-generation C2 (Command & Control) server designed for professional Red Team operations. Built with Go and PocketBase, it offers a modern and specialized alternative to comp…

Python 5 3 Updated Oct 31, 2025

Extract passwords stored in Google Chrome browser & Microsoft edge

Python 1 Updated Feb 10, 2025
Python 1 Updated Feb 10, 2025

Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode

PowerShell 2,467 493 Updated Nov 15, 2023

Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading

C# 865 110 Updated Jul 21, 2020

A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.

Python 3,381 526 Updated Jan 19, 2025

A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload

Python 44 5 Updated Oct 28, 2025

INE eCPPTv3 Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eCPPTv3 course. These are the exact materials I used during my exam.

61 11 Updated Aug 24, 2025
Next