Skip to content
View bewniac's full-sized avatar

Organizations

@securityfest

Block or report bewniac

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
106 stars written in C
Clear filter

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

C 1,301 278 Updated Jan 31, 2022

A modern 32/64-bit position independent implant template

C 1,262 204 Updated Mar 21, 2025

Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.

C 1,258 191 Updated Aug 11, 2024

A memory-based evasion technique which makes shellcode invisible from process start to end.

C 1,195 143 Updated Oct 16, 2023

Ncrack network authentication tool

C 1,166 261 Updated Apr 14, 2024

LoadLibrary for offensive operations

C 1,163 208 Updated Oct 22, 2021

Credentials Dumper for Linux using eBPF

C 1,150 64 Updated Sep 9, 2024

Collection of PoC and offensive techniques used by the BlackArrow Red Team

C 1,134 189 Updated Jul 19, 2024

Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in user mode, no admin rights required.

C 1,130 193 Updated Nov 7, 2025

The Open-Smartwatch Operating System.

C 1,078 166 Updated Jun 28, 2025

AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)

C 963 207 Updated May 26, 2025

Instrument Cluster Simulator

C 909 240 Updated Sep 18, 2025

Dump the memory of a PPL with a userland exploit

C 880 141 Updated Jul 24, 2022

Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.

C 858 110 Updated Jan 20, 2022

Complete list of LPE exploits for Windows (starting from 2023)

C 835 114 Updated Nov 5, 2025

MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash

C 798 61 Updated Sep 30, 2022

Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+Bloc…

C 727 98 Updated Aug 7, 2025

Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

C 718 102 Updated May 23, 2025

A collection of my Semgrep rules to facilitate vulnerability research.

C 709 70 Updated Nov 7, 2025

Simple DNS Rebinding Service

C 703 86 Updated Jan 16, 2020

some gadgets about windows process and ready to use :)

C 611 96 Updated Oct 7, 2023

PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.

C 610 64 Updated Sep 26, 2023

PIC lsass dumper using cloned handles

C 595 106 Updated Oct 18, 2022

Collection of UAC Bypass Techniques Weaponized as BOFs

C 575 71 Updated Feb 21, 2024

HookChain: A new perspective for Bypassing EDR Solutions

C 569 96 Updated Jan 5, 2025

Winnie makes fuzzing Windows applications easy

C 563 78 Updated Nov 28, 2022

Raw binary firmware analysis software

C 562 61 Updated Jun 6, 2024

Encrypted PE Loader Generator

C 547 106 Updated Aug 13, 2021

A TCP/UDP based network daemon fuzzer

C 524 74 Updated Jun 2, 2024

SSH Session Monitoring Daemon

C 523 29 Updated May 12, 2023