-
MacroSec Ltd
- Nairobi, Kenya
- https://macrosec.tech
- All languages
- ASP.NET
- Assembly
- AutoHotkey
- AutoIt
- Batchfile
- Bicep
- Boo
- C
- C#
- C++
- CMake
- CSS
- D
- Dockerfile
- Go
- Groovy
- HCL
- HTML
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Nim
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Smarty
- TypeScript
- VBA
- VBScript
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
- Zig
Starred repositories
Kubernetes Enumeration Tools for Penetration Testing - K8s security assessment scripts for red team operations
A modern GoPhish fork with improved tracking accuracy and smarter detection.
Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool
Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephemeral access into restricted environments using Tailscale’s …
A dam control simulation for MITRE Caldera for OT
A simplified simulation of a water treatment plant with Modbus and BACnet process control. Designed to serve as a target for MITRE Caldera for OT.
NTP covert channel C2 framework. Dual-mode server provides legitimate time sync while managing cross-platform agents. Go + Vue.js. Based on d3adzo/mesa.
This repo contains useful scripts that AI created for me which I would have been too lazy for
A role for installing Splunk Enterprise on a Debian host.
A role for deploying the Splunk UF to lab hosts.
a DNS (check-in) + HTTPS (data) hybrid C2 covert channel inspired by Sunburst + DNS sandwich
Open Source Implementation of Cobalt Strike's Malleable C2
Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled Tasks.
Sniffs outbound traffic for suspicious, beacon-like callbacks, because if it keeps coming back on schedule, it's probably not breakfast.
Fabric is an open-source framework for augmenting humans using AI. It provides a modular system for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.
minica is a small, simple CA intended for use in situations where the CA operator also operates each host where a certificate will be used.
AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)
I turned The Metasploit Project's Polymorphic XOR Encoder, "Shikata Ga Nai" ("there is no other way") into my own encoder that works on emulated x86/64 for ARM called "Fukahi Tekiō" (不可避適応 or "inev…
Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bookmarks from modern Chromium-based and Gecko-based browsers …
A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-based detection research, and evasion analysis.