Skip to content
View chr0n1k's full-sized avatar

Block or report chr0n1k

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

2475 results for source starred repositories
Clear filter

Kubernetes Enumeration Tools for Penetration Testing - K8s security assessment scripts for red team operations

Shell 9 Updated Feb 2, 2026

A modern GoPhish fork with improved tracking accuracy and smarter detection.

Go 44 4 Updated Feb 2, 2026

Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool

C++ 299 42 Updated Nov 20, 2025

Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries

C++ 603 59 Updated Feb 5, 2026

Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephemeral access into restricted environments using Tailscale’s …

Go 498 38 Updated Oct 3, 2025

A dam control simulation for MITRE Caldera for OT

Python 4 6 Updated Aug 14, 2025

A simplified simulation of a water treatment plant with Modbus and BACnet process control. Designed to serve as a target for MITRE Caldera for OT.

HTML 1 1 Updated Jan 30, 2026

NTP covert channel C2 framework. Dual-mode server provides legitimate time sync while managing cross-platform agents. Go + Vue.js. Based on d3adzo/mesa.

Go 3 1 Updated Jan 4, 2026

This repo contains useful scripts that AI created for me which I would have been too lazy for

Python 64 7 Updated Feb 5, 2026

MCP Server for Metasploit

Python 481 148 Updated Oct 4, 2025

A role for installing Splunk Enterprise on a Debian host.

Jinja 4 1 Updated Jan 27, 2026

A role for deploying the Splunk UF to lab hosts.

Jinja 4 Updated Jan 27, 2026

a DNS (check-in) + HTTPS (data) hybrid C2 covert channel inspired by Sunburst + DNS sandwich

Go 7 Updated Jan 26, 2026

Open Source Implementation of Cobalt Strike's Malleable C2

C 88 11 Updated Jan 27, 2026
C 161 12 Updated Oct 21, 2025

CVE-2025-27237 Zabbix LPE PoC

Python 17 2 Updated Jan 26, 2026

Exploitation of CVE-2026-24061

Python 187 41 Updated Jan 22, 2026

Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled Tasks.

C++ 69 12 Updated Jan 24, 2026
Python 58 8 Updated Jan 22, 2026

Sniffs outbound traffic for suspicious, beacon-like callbacks, because if it keeps coming back on schedule, it's probably not breakfast.

Python 17 Updated Jan 22, 2026

Fabric is an open-source framework for augmenting humans using AI. It provides a modular system for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.

Go 38,840 3,882 Updated Feb 3, 2026

minica is a small, simple CA intended for use in situations where the CA operator also operates each host where a certificate will be used.

Go 3,257 262 Updated Sep 3, 2025

Mythic C2 CheatSheet for OSEP

C# 53 9 Updated Jan 21, 2026

AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)

Rust 190 29 Updated Jan 21, 2026

Just another EDR killer

C 88 14 Updated Jan 21, 2026

Hunt Smarter, Hunt Harder

TypeScript 135 15 Updated Jan 12, 2026

I turned The Metasploit Project's Polymorphic XOR Encoder, "Shikata Ga Nai" ("there is no other way") into my own encoder that works on emulated x86/64 for ARM called "Fukahi Tekiō" (不可避適応 or "inev…

Python 8 4 Updated Jan 27, 2026

Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bookmarks from modern Chromium-based and Gecko-based browsers …

C 488 73 Updated Jan 26, 2026

A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-based detection research, and evasion analysis.

C++ 21 3 Updated Jan 17, 2026
Next