Skip to content
View dn9uy3n's full-sized avatar

Block or report dn9uy3n

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

generate CobaltStrike's cross-platform payload

C 2,551 374 Updated Nov 20, 2023

An open-source long-horizon SuperAgent harness that researches, codes, and creates. With the help of sandboxes, memories, tools, skill, subagents and message gateway, it handles different levels of…

Python 53,615 6,459 Updated Mar 30, 2026

Extract Windows credentials directly from VM memory snapshots and virtual disks

Rust 821 70 Updated Mar 24, 2026

Real-time speech translation — macOS & Windows, free TTS, no server, your API keys only

JavaScript 684 260 Updated Mar 26, 2026

753+ structured cybersecurity skills for AI agents · MITRE ATT&CK mapped · agentskills.io open standard · Works with Claude Code, GitHub Copilot, OpenAI Codex CLI, Cursor, Gemini CLI & 20+ platform…

Python 3,866 400 Updated Mar 28, 2026

The goal of this repository is to document the most common techniques to bypass AppLocker.

PowerShell 2,056 366 Updated Sep 11, 2023

A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.

C# 1,098 181 Updated Jul 26, 2021

Official inference framework for 1-bit LLMs

Python 36,850 3,212 Updated Mar 10, 2026

AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 · x64 · x86 · WoW64 · ARM64

Python 397 48 Updated Mar 7, 2026

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Go 14,781 2,586 Updated Oct 6, 2025

AdaptixC2 is a highly modular advanced redteam toolkit

C++ 2,873 509 Updated Mar 22, 2026

Mentally ill EtwTi parser

C++ 69 4 Updated Jan 11, 2026

Cobalt Strike MCP based on CS 4.12

Python 8 2 Updated Dec 4, 2025

MCP Server for Cobalt Strike interaction.

Python 15 5 Updated Dec 19, 2025

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

C 3,259 822 Updated Sep 3, 2022

A centralized resource for previously documented WDAC bypass techniques

615 84 Updated Sep 8, 2025

Advanced Command and Control Framework for Authorized Red Team Operations

C++ 46 11 Updated Mar 1, 2026

Evasion kit for Cobalt Strike

C 405 49 Updated Mar 5, 2026

使用C简单重构Beacon,适配CobaltStrike客户端

C 100 31 Updated Feb 6, 2026

Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons

C 197 38 Updated Feb 11, 2026

Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.

569 73 Updated Feb 12, 2026

Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…

Python 1,523 197 Updated Mar 29, 2026

An AI-powered agentic red team framework that automates offensive security operations, from reconnaissance to exploitation to post-exploitation, with zero human intervention.

Python 1,674 346 Updated Mar 29, 2026

Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from silent in-process BOF to full PowerShell/WMI.

C 44 4 Updated Feb 6, 2026

OSINT cheat sheet, list OSINT tools, wiki, dataset, article, book , red team OSINT for hackers and OSINT tips and OSINT branch. This repository will grow every time will research, there is a resear…

HTML 1,833 270 Updated Mar 25, 2026

A tool for BLE environment monitoring. Find and track Bluetooth devices around, and get notified when the target device is detected.

Kotlin 1,329 94 Updated Jan 22, 2026

Open source platform for cyber security analysts with many features for threat intelligence and detection engineering.

JavaScript 841 142 Updated Aug 17, 2025

This map lists the essential techniques to bypass anti-virus and EDR

3,179 348 Updated Mar 28, 2025

SpiderSuite releases, wiki and roadmap

943 121 Updated Mar 5, 2026

This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stage…

C++ 1,060 174 Updated Mar 10, 2026
Next