Skip to content
View ajq2679's full-sized avatar
  • 10:38 (UTC -05:00)

Block or report ajq2679

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

155 stars written in C
Clear filter

syslog-ng is an enhanced log daemon, supporting a wide range of input and output methods: syslog, unstructured text, queueing, SQL & NoSQL.

C 2,289 497 Updated Nov 10, 2025

A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.

C 2,261 421 Updated Nov 4, 2025

LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)

C 2,179 473 Updated Oct 18, 2025

iPhone 11 emulated on QEMU

C 2,171 477 Updated Oct 22, 2022

A post exploitation framework designed to operate covertly on heavily monitored environments

C 2,161 334 Updated Sep 29, 2021

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

C 2,117 295 Updated Aug 15, 2024

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

C 2,027 358 Updated May 28, 2025

Small tool to capture packets from wlan devices.

C 2,027 409 Updated Nov 7, 2025

Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.

C 2,027 447 Updated Nov 2, 2025

Open-Source Shellcode & PE Packer

C 2,026 334 Updated Feb 3, 2024

Unified repository for different Metasploit Framework payloads

C 1,909 710 Updated Oct 24, 2025

A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.

C 1,907 239 Updated Apr 7, 2024

Windows Object Explorer 64-bit

C 1,838 305 Updated Oct 27, 2025

Windows Event Log Killer

C 1,802 306 Updated Sep 21, 2023

A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.

C 1,771 231 Updated Nov 3, 2024

Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.

C 1,642 182 Updated Oct 19, 2023

LSASS memory dumper using direct system calls and API unhooking.

C 1,561 250 Updated Jan 5, 2021

A little toolbox to play with Microsoft Kerberos in C

C 1,501 221 Updated Dec 14, 2021

A tool to kill antimalware protected processes

C 1,483 249 Updated Jun 19, 2021

A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

C 1,375 266 Updated Nov 22, 2023

[Historical wayland fork - see davatorium/rofi!] Rofi: A window switcher, run dialog and dmenu replacement

C 1,336 49 Updated Sep 12, 2025

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

C 1,301 278 Updated Jan 31, 2022

Snoopy Command Logger is a small library that logs all program executions on your Linux/BSD system.

C 1,279 158 Updated Oct 24, 2024

ZBar is an open source software suite for reading bar codes from various sources, including webcams. As its development stopped in 2012, I took the task of keeping it updated with the V4L2 API. Thi…

C 1,222 223 Updated Jul 30, 2024

Public open-source code of malware Stuxnet (aka MyRTUs).

C 1,141 185 Updated Aug 27, 2022

Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in user mode, no admin rights required.

C 1,140 200 Updated Nov 7, 2025

Collection of PoC and offensive techniques used by the BlackArrow Red Team

C 1,137 189 Updated Jul 19, 2024