Skip to content
View ohpe's full-sized avatar
🎣
🎣

Organizations

@bettercap @muraenateam

Block or report ohpe

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Abuse trust-boundaries to bypass firewalls and network controls

Go 413 69 Updated Jul 24, 2025

A tool to test cross-device authentication protocol security

Go 26 Updated Feb 24, 2025

A Certificate Transparency log implementation and monitoring API designed for scalability, ease of operation, and reduced cost.

Go 283 23 Updated Mar 20, 2026

📮 The free temporary email service powered by Cloudflare

Svelte 221 22 Updated Mar 26, 2026

The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷

Rust 1,834 111 Updated Sep 18, 2025

PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers

C# 369 33 Updated May 22, 2023

RunasCs - Csharp and open version of windows builtin runas.exe

C# 1,358 162 Updated Jul 12, 2024

A tool that combines DNS and WHOIS to automatically monitor domain name changes.

Go 18 4 Updated Mar 7, 2023

A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass…

C 673 89 Updated Dec 23, 2022

Remote operations commands implemented using Beacon Object Files

C 1,145 174 Updated Mar 5, 2026

WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations

C# 374 52 Updated Oct 30, 2020

Automate the creation of a lab environment complete with security tooling and logging best practices

HTML 4,930 1,014 Updated Jul 6, 2024

Desktop environment in the browser

JavaScript 12,561 1,116 Updated Mar 27, 2026

A mostly-serverless distributed hash cracking platform

JavaScript 654 78 Updated Dec 13, 2025

captcha-killer的修改版,支持关键词识别base64编码的图片,添加免费ocr库,用于验证码爆破,适配新版Burpsuite

Java 1,887 177 Updated Aug 26, 2025

Iceman Fork - Proxmark3

C 5,391 1,292 Updated Mar 30, 2026

Event Tracing For Windows (ETW) Resources

Python 421 78 Updated Oct 30, 2025

Collected and authored guides for personal and operational security.

68 9 Updated Dec 21, 2022

Maximizing BloodHound. Max is a good boy.

Python 532 64 Updated Apr 25, 2025

Slides from out talk at BH IL 2022

29 4 Updated Mar 21, 2022

Connect like there is no firewall. Securely.

C 1,841 190 Updated Mar 25, 2026

Fake Windows logon screen to steal passwords

C# 1,372 239 Updated Feb 3, 2020

☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud

Go 2,287 292 Updated Mar 30, 2026

Hookers are cooler than patches.

C# 170 22 Updated Jan 21, 2022

Convert ldapdomaindump to Bloodhound

Python 80 7 Updated Dec 19, 2023

yubikey-agent is a seamless ssh-agent for YubiKeys.

Go 2,867 158 Updated Dec 3, 2023

Understand adversary tradecraft and improve detection strategies

PowerShell 712 76 Updated Mar 9, 2023

SSHPry v2 - Spy & Control os SSH Connected client's TTY

Python 400 78 Updated Oct 12, 2017

Windows Privilege Escalation from User to Domain Admin.

C 1,454 223 Updated Dec 18, 2022

Scan files or process memory for CobaltStrike beacons and parse their configuration

C# 921 117 Updated Aug 19, 2021
Next