Skip to content
View ajq2679's full-sized avatar
  • 10:41 (UTC -05:00)

Block or report ajq2679

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

154 stars written in C
Clear filter

syslog-ng is an enhanced log daemon, supporting a wide range of input and output methods: syslog, unstructured text, queueing, SQL & NoSQL.

C 2,288 496 Updated Nov 5, 2025

A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.

C 2,255 419 Updated Nov 4, 2025

LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)

C 2,176 470 Updated Oct 18, 2025

iPhone 11 emulated on QEMU

C 2,171 476 Updated Oct 22, 2022

A post exploitation framework designed to operate covertly on heavily monitored environments

C 2,160 336 Updated Sep 29, 2021

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

C 2,111 295 Updated Aug 15, 2024

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

C 2,027 358 Updated May 28, 2025

Small tool to capture packets from wlan devices.

C 2,024 410 Updated Nov 6, 2025

Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.

C 2,023 446 Updated Nov 2, 2025

Open-Source Shellcode & PE Packer

C 2,017 334 Updated Feb 3, 2024

Unified repository for different Metasploit Framework payloads

C 1,908 710 Updated Oct 24, 2025

A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.

C 1,907 238 Updated Apr 7, 2024

Windows Object Explorer 64-bit

C 1,836 305 Updated Oct 27, 2025

Windows Event Log Killer

C 1,802 306 Updated Sep 21, 2023

A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.

C 1,768 229 Updated Nov 3, 2024

Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.

C 1,642 182 Updated Oct 19, 2023

LSASS memory dumper using direct system calls and API unhooking.

C 1,562 249 Updated Jan 5, 2021

A little toolbox to play with Microsoft Kerberos in C

C 1,499 221 Updated Dec 14, 2021

A tool to kill antimalware protected processes

C 1,483 249 Updated Jun 19, 2021

A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

C 1,370 263 Updated Nov 22, 2023

[Historical wayland fork - see davatorium/rofi!] Rofi: A window switcher, run dialog and dmenu replacement

C 1,335 49 Updated Sep 12, 2025

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

C 1,301 278 Updated Jan 31, 2022

Snoopy Command Logger is a small library that logs all program executions on your Linux/BSD system.

C 1,277 158 Updated Oct 24, 2024

ZBar is an open source software suite for reading bar codes from various sources, including webcams. As its development stopped in 2012, I took the task of keeping it updated with the V4L2 API. Thi…

C 1,219 222 Updated Jul 30, 2024

Public open-source code of malware Stuxnet (aka MyRTUs).

C 1,140 185 Updated Aug 27, 2022

Collection of PoC and offensive techniques used by the BlackArrow Red Team

C 1,134 189 Updated Jul 19, 2024

Another Windows Local Privilege Escalation from Service Account to System

C 1,133 135 Updated Jan 9, 2021