Skip to content
View faruqliman's full-sized avatar
  • AJISAQ Limited
  • No 5, Plot 14, Bishop Dalton Plaza, Galadima Aminu Way, Jimeta Yola, Adamawa State, Nigeria
  • X @FaruqLiman

Block or report faruqliman

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

openpilot is an operating system for robotics. Currently, it upgrades the driver assistance system on 300+ supported cars.

Python 58,742 10,393 Updated Nov 5, 2025

InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditiona…

C 710 137 Updated Jul 22, 2023

Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.

2,327 295 Updated Feb 24, 2023

Programmatically create an administrative user under Windows

C 183 55 Updated Mar 10, 2017

Another Windows Local Privilege Escalation from Service Account to System

C 1,133 135 Updated Jan 9, 2021

The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.

PowerShell 927 203 Updated Jun 22, 2020

SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket

PowerShell 901 118 Updated Jul 26, 2021

Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527

18 8 Updated Jul 12, 2021

.NET project for installing Persistence

C# 491 102 Updated Jun 26, 2024

.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py

C# 611 74 Updated Feb 16, 2023

Cobalt Strike kit for Lateral Movement

C# 677 111 Updated Feb 21, 2020

Extract credentials from lsass remotely

Python 2,158 255 Updated Nov 5, 2025

SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by…

C# 1,255 150 Updated Dec 15, 2020

A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)

PowerShell 194 19 Updated Jul 7, 2021

Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands

C# 1,008 138 Updated Nov 7, 2021
Shell 9 4 Updated Sep 3, 2024

Adversary Tactics - PowerShell Training

PowerShell 1,561 339 Updated Jan 22, 2020

"Golden" certificates

C# 707 117 Updated Aug 17, 2024

Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.

C# 959 152 Updated Nov 18, 2020

C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.

Python 1,091 174 Updated Jun 25, 2024

PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.

PowerShell 894 125 Updated Feb 28, 2024

Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).

Jupyter Notebook 791 113 Updated Oct 4, 2025

PowerShell for every system!

C# 50,687 8,054 Updated Nov 4, 2025

CVE-2021-1675 Detection Info

215 38 Updated May 20, 2023

12 weeks, 26 lessons, 52 quizzes, classic Machine Learning for all

Jupyter Notebook 78,616 18,166 Updated Oct 24, 2025