Skip to content
View wizard2773's full-sized avatar
  • Africa
  • 01:40 (UTC +03:00)

Block or report wizard2773

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Modular C# framework to exfiltrate loot over secure and trusted channels.

C# 1 Updated Sep 12, 2021

Egress-Assess is a tool used to test egress data detection capabilities

PowerShell 1 Updated Aug 9, 2023

Data exfiltration over DNS request covert channel

JavaScript 1 Updated Apr 29, 2024

Cobalt Strike kit for Lateral Movement

C# 1 Updated Feb 21, 2020

Fileless lateral movement tool that relies on ChangeServiceConfigA to run command

C 1 Updated Jul 10, 2023

Persistence by writing/reading shellcode from Event Log

C# 1 Updated May 27, 2022

.NET project for installing Persistence

C# 1 Updated Jun 26, 2024

SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications

Python 1 Updated Nov 26, 2023

Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (AC…

C 1 Updated Mar 8, 2023

Loads any C# binary in mem, patching AMSI + ETW.

C# 1 Updated Oct 3, 2021

Beacon Object File PoC implementation of KillDefender

C 1 Updated Apr 12, 2022

Identifies the bytes that Microsoft Defender flags on.

C# 1 Updated Sep 14, 2023

Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods

Go 1 Updated Aug 18, 2023

A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.

C# 1 Updated Jul 26, 2021

Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…

Python 1 Updated May 21, 2025

Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.

Python 1 Updated Dec 13, 2022

Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities

C# 1 Updated Nov 28, 2020

PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)

C# 1 Updated Oct 1, 2025

SharpUp is a C# port of various PowerUp functionality.

C# 1 Updated Feb 14, 2024

Mimikatz implementation in pure Python

Python 1 Updated Sep 18, 2025

.NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences.

C# 1 Updated Dec 18, 2019

Retrieve LAPS password from LDAP

C# 1 Updated Feb 17, 2021

A little tool to play with Windows security

C 1 Updated May 11, 2025

A collaborative, multi-platform, red teaming framework

JavaScript 1 Updated Sep 28, 2025

The Havoc Framework

Go 1 Updated Jul 10, 2025

AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.

C# 1 Updated Feb 15, 2021

An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

Boo 1 Updated Dec 6, 2023

Adversary Emulation Framework

Go 1 Updated Sep 18, 2025
Next