Skip to content
View b33f00d's full-sized avatar
:shipit:
¯\_(ツ)_/¯
:shipit:
¯\_(ツ)_/¯

Highlights

  • Pro

Block or report b33f00d

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
713 results for source starred repositories
Clear filter

15-stage Windows malware development & analysis course in Rust. Red team builds it, blue team detects it. All 15 binaries achieved 0/76 on VirusTotal.

197 22 Updated Mar 27, 2026
Python 30 Updated Apr 22, 2026

OWASP Autonomous Penetration Testing Standard

Python 617 78 Updated Apr 30, 2026

Vulnerability scanner written in Go which uses the data provided by https://osv.dev

Go 9,984 673 Updated May 1, 2026

claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a s…

1,129 191 Updated Apr 15, 2026

Another FAFO project: Weaponizing MSI installers for fileless code execution

Python 21 5 Updated Apr 30, 2026

Repository hosting the bluehammer vulnerability

C 1,794 646 Updated Apr 9, 2026

RAG pipeline security testing toolkit - 27 techniques across 6 kill chain phases, mapped to MITRE ATLAS

Python 31 4 Updated Apr 19, 2026

This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those ded…

C++ 158 27 Updated May 22, 2025

SilentChrome-BOF is a BOF (Beacon Object File) that silently installs a browser extension into Chrome or Edge by modifying the Preferences and Secure Preferences files directly.

C 25 1 Updated Apr 3, 2026

Example extensions for CrystalC2

C 8 Updated Mar 28, 2026

Free educational content on reverse engineering and malware analysis from the FLARE team

JavaScript 1,131 78 Updated Mar 31, 2026

InfraGuard is a Command & Control Redirection Proxy and Manager which protects your Red Team Infrastructure against threat attribution

Python 143 9 Updated Apr 6, 2026

Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)

Go 1,117 91 Updated Nov 9, 2024

Fully autonomous AI Agents system capable of performing complex penetration testing tasks

Go 16,208 2,202 Updated Apr 30, 2026

NetBird mesh VPN C2 profile and Stymphalian demo agent for Mythic

Go 9 1 Updated Mar 17, 2026

Tailscale/Headscale C2 profile and agent for Mythic

Go 25 1 Updated Mar 14, 2026

A Mythic C2 Profile that uses AWS S3 for command and control communication with per-execution credential isolation.

Python 13 3 Updated Mar 14, 2026

Golang Automation Framework for Cobalt Strike using the Rest API

Go 59 7 Updated Apr 10, 2026

Extract Windows credentials directly from VM memory snapshots and virtual disks

Rust 1,228 139 Updated Apr 18, 2026

The world's first agentic reverse engineer.

Python 641 89 Updated Apr 3, 2026
PowerShell 8 Updated Mar 31, 2026

Active Directory Vulnerability Scanner

Python 417 48 Updated Mar 3, 2026
Python 18 Updated Mar 10, 2026

Lab4PurpleSec is a modular Purple Team homelab combining a vulnerable Active Directory environment (GOAD), a Docker-based web DMZ, pfSense + Suricata, and a Wazuh SIEM. It provides a realistic, ope…

Shell 223 22 Updated Dec 31, 2025

A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing SharpHound and AzureHound data.

Go 85 5 Updated Apr 25, 2026

Run TTPs, with AI!

TypeScript 128 16 Updated Feb 23, 2026

MLOps Attack Toolkit in Python

Python 16 1 Updated Feb 20, 2026

A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, without touching LSASS process memory.

C 296 36 Updated Feb 21, 2026

PowerShell implementation for AD CS

PowerShell 144 14 Updated Mar 2, 2026
Next