Skip to content
View zyn3rgy's full-sized avatar

Block or report zyn3rgy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard history.

C 100 5 Updated Jan 9, 2026

Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.

C 203 22 Updated Jan 6, 2026
C 161 11 Updated Oct 21, 2025

winapp, the Windows App Development CLI, is a single command-line interface for managing Windows SDKs, packaging, generating app identity, manifests, certificates, and using build tools with any ap…

C# 718 23 Updated Feb 4, 2026

Using Chromium-based browsers as a proxy for C2 traffic.

C 140 11 Updated Dec 6, 2025

SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…

C 432 65 Updated Nov 3, 2025

Mobile application for Audiobookshelf

Vue 2,294 306 Updated Feb 3, 2026

AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.

Python 5,355 576 Updated Feb 3, 2026

Windows protocol library, including SMB and RPC implementations, among others.

C# 609 68 Updated Jan 21, 2026

365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.

PHP 564 105 Updated Jun 27, 2025

IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare

Python 267 17 Updated Dec 15, 2025

Obex – Blocking unwanted DLLs in user mode

C 280 37 Updated Sep 18, 2025

Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.

C++ 597 69 Updated Feb 2, 2026

Weaponize DLL hijacking easily. Backdoor any function in any DLL.

Go 705 85 Updated Aug 26, 2025

Bypass user-land hooks by syscall tampering via the Trap Flag

C 138 22 Updated Aug 25, 2025

The Fully Customizable Desktop Environment for Windows 10/11.

Rust 15,761 482 Updated Feb 3, 2026

Group Policy Objects manipulation and exploitation framework

Python 288 31 Updated Dec 7, 2025

A hoontr must hoont

Rust 103 10 Updated Nov 27, 2025

List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting.

20,161 968 Updated Jan 21, 2026
C 137 13 Updated Nov 17, 2025

Evasive Payload Delivery Server & C2 Redirector

Python 112 12 Updated Nov 3, 2025

C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, pivot and more.

C++ 195 33 Updated Dec 30, 2025

PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph

PowerShell 290 19 Updated Jan 22, 2026
Go 2 Updated Jan 3, 2025

Seamless remote browser session control

TypeScript 224 19 Updated Jan 28, 2026

SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.

Python 159 42 Updated Jan 23, 2026

A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…

YARA 1,297 144 Updated Nov 12, 2025
Python 104 12 Updated Jan 20, 2026

Code execution/injection technique using DLL PEB module structure manipulation

C++ 220 36 Updated Jun 4, 2025

Reflective shellcode loaderwith advanced call stack spoofing and .NET support.

C 225 46 Updated Sep 19, 2025
Next