Skip to content
View chr0n1k's full-sized avatar

Sponsoring

@S3cur3Th1sSh1t

Block or report chr0n1k

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

38 stars written in HTML
Clear filter

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 12,427 1,465 Updated Sep 17, 2025

Crack Interface lockscreen, Metasploit and More Android/IOS Hacking

HTML 2,770 498 Updated Mar 12, 2024

Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)

HTML 2,473 353 Updated Apr 27, 2025

Tools, tips, tricks, and more for exploring ICS Security.

HTML 1,885 476 Updated Apr 15, 2025

ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.

HTML 1,881 296 Updated Jun 15, 2020

CVE-2021-40444 PoC

HTML 1,686 479 Updated Dec 25, 2021

WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.

HTML 1,623 191 Updated Aug 29, 2025

Malware samples, analysis exercises and other interesting resources.

HTML 1,595 235 Updated Jan 13, 2024

Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI

HTML 992 118 Updated May 10, 2025

OSINT Project. Collect information from a mail. Gather. Profile. Timeline.

HTML 925 154 Updated Jul 17, 2024

Microsoft » Windows 10 : Security Vulnerabilities

HTML 922 209 Updated Nov 26, 2025

CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit

HTML 822 170 Updated Oct 11, 2023

Phishing with a fake reCAPTCHA

HTML 630 141 Updated Sep 13, 2024

Weaponized Browser-in-the-Middle (BitM) for Penetration Testers

HTML 582 65 Updated Dec 9, 2025

A fully functional DanderSpritz lab in 2 commands

HTML 448 105 Updated May 16, 2019

Certified Red Team Operator

HTML 439 122 Updated Apr 17, 2022

HTML smuggling is not an evil, it can be useful

HTML 387 47 Updated Feb 19, 2024

A library of pretexts to use on offensive phishing engagements.

HTML 381 82 Updated Aug 9, 2019

The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into another.

HTML 359 74 Updated Nov 19, 2024

Operating System Design Review: A systematic analysis of modern systems architecture

HTML 334 26 Updated Dec 1, 2025

Chrome browser extension-based Command & Control

HTML 224 29 Updated Jul 2, 2025

peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.

HTML 220 27 Updated Apr 14, 2025

CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability

HTML 146 27 Updated Jan 13, 2025

Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.

HTML 143 29 Updated Nov 2, 2022

smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters

HTML 132 26 Updated Mar 25, 2025

Collection of tools to use with Azure Applications

HTML 112 18 Updated Oct 13, 2023

A Payload Analysis Framework

HTML 112 9 Updated Oct 9, 2025

Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged

HTML 88 20 Updated Jul 7, 2022
Next