Skip to content
View 0x48756773's full-sized avatar

Block or report 0x48756773

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
99 stars written in C
Clear filter

Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams

C 616 81 Updated Oct 6, 2025

Cobalt Strike HTTPS beaconing over Microsoft Graph API

C 616 99 Updated Jun 25, 2024

tools

C 545 240 Updated Apr 9, 2019

A command-line network packet crafting and injection utility

C 525 75 Updated Sep 29, 2023

Executes PowerShell from an unmanaged process

C 506 113 Updated Mar 17, 2016

Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (AC…

C 469 73 Updated Mar 8, 2023

An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.

C 456 62 Updated Apr 22, 2025

OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS

C 447 206 Updated Jul 19, 2024

iOS 11.1.2 (15B202) Jailbreak

C 437 96 Updated Apr 6, 2021

PoC for CVE-2021-3156 (sudo heap overflow)

C 436 108 Updated Apr 14, 2022

Web Fuzzer

C 427 368 Updated Sep 4, 2023

LPE exploit for CVE-2023-21768

C 422 66 Updated Mar 8, 2023

Course materials for hackaday.io Ghidra training

C 410 92 Updated Dec 26, 2023

Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.

C 382 70 Updated Mar 8, 2023

Library and tools to access the Extensible Storage Engine (ESE) Database File (EDB) format.

C 367 86 Updated Aug 4, 2024

CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)

C 297 56 Updated Sep 28, 2021

Cobalt Strike BOF for evasive .NET assembly execution

C 285 36 Updated Mar 31, 2025

Tool to extract Kerberos tickets from Linux kernel keys.

C 232 48 Updated May 28, 2019

Library and tools to access the Windows Shortcut File (LNK) format

C 207 33 Updated Oct 15, 2024

An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution

C 194 29 Updated Nov 27, 2024

Malicious USB

C 174 34 Updated Nov 4, 2023

Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique

C 157 17 Updated Nov 7, 2023

Determine if the WebClient Service (WebDAV) is running on a remote system

C 140 29 Updated Mar 9, 2024

An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are available.

C 138 20 Updated Oct 1, 2022

Custom implementation of DbgHelp's MiniDumpWriteDump function. Uses static syscalls to replace low-level functions like NtReadVirtualMemory.

C 127 25 Updated Jan 18, 2022

Scalpel; File Carving. Configuration files are modified.

C 122 57 Updated Mar 25, 2013

Collection of Beacon Object Files (BOFs) for shells and lols

C 121 13 Updated Sep 14, 2021