Skip to content
View jakobfriedl's full-sized avatar
🔱
🔱

Block or report jakobfriedl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jakobfriedl/README.md

Header

{
  "occupation": "penetration tester / red teamer",
  "currently_working_on": [
    "c2 development",
    "red team ops & infrastructure"
  ],
  "certs": [
    "osep",
    "oscp",
    "oswp",
    "crto",
    "maldev academy",
    "htb pro labs (aptlabs, cybernetics, alchemy, offshore, zephyr, rastalabs, dante)"
  ] 
}

Pinned Loading

  1. conquest conquest Public

    Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.

    Nim 244 28

  2. precompiled-binaries precompiled-binaries Public

    Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments

    PowerShell 222 54

  3. BenevolentLoader BenevolentLoader Public

    Shellcode loader using direct syscalls via Hell's Gate and payload encryption.

    C 99 19

  4. malware-development malware-development Public

    Progressing on my malware development journey.

    C 13 3

  5. jakobfriedl.github.io jakobfriedl.github.io Public

    Personal website & blog

    HTML 1

  6. parcel-logistics-service parcel-logistics-service Public

    Full stack ASP.NET application that allows users to submit, track and move parcels on a predicted route based on geo-coordinates.

    C# 3