Skip to content
View Nero22k's full-sized avatar
🙃
🙃
  • NSA
  • Fort Meade, Maryland

Highlights

  • Pro

Block or report Nero22k

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

UAC Bypass using UIAccess program QuickAssist

C 167 18 Updated Nov 19, 2025

Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool

C++ 244 32 Updated Nov 20, 2025

Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence

Python 371 68 Updated Nov 7, 2025

PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads

PowerShell 219 23 Updated Oct 30, 2025

A Python tool for discovering, downloading, and extracting metadata from publicly available files on target domains. Useful for OSINT.

Python 13 Updated Nov 7, 2025

A fork of the great TokenTactics with support for CAE and token endpoint v2

PowerShell 342 43 Updated Nov 2, 2025

SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…

C 378 62 Updated Nov 3, 2025

The DCERPC only printerbug.py version

Python 167 22 Updated Oct 30, 2025

Crystal Palace library for proxying Nt API calls via the Threadpool

C 87 10 Updated Oct 18, 2025

A BOF that's a BOF Loader

C++ 140 18 Updated Nov 23, 2025

Dynamic shellcode loader with sophisticated evasion capabilities

Assembly 259 50 Updated Oct 1, 2025

Lateral Movement Bof with MSI ODBC Driver Install

C 138 15 Updated Sep 30, 2025

Transistor level NES simulation

JavaScript 1,915 39 Updated Apr 14, 2022

Testimo is a PowerShell module for running health checks for Active Directory against a bunch of different tests

PowerShell 622 75 Updated Aug 17, 2025

The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.

C++ 164 11 Updated Sep 8, 2025

Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI

HTML 951 111 Updated May 10, 2025

Windows protocol library, including SMB and RPC implementations, among others.

C# 575 65 Updated Nov 3, 2025

A curated knowledge base of techniques abusing legitimate web services for evasion, exfiltration, C2, and more.

3 1 Updated Jul 9, 2025

Direct access to NTFS volumes

Rust 287 25 Updated Sep 9, 2025

Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.

C++ 562 60 Updated Sep 9, 2025

SSHamble: Unexpected Exposures in SSH

Go 1,162 86 Updated Nov 24, 2025

Binary Exploitation Phrack CTF Challenge

C 138 7 Updated Aug 21, 2025
Assembly 45 3 Updated Oct 5, 2025

Enhance Your Active Directory Password Spraying with User Intelligence.

Python 300 28 Updated Aug 25, 2025

OffSec OSINT Pentest/RedTeam Tools

1,068 128 Updated Jun 4, 2025

A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such as Zoom.

Go 351 32 Updated Aug 18, 2025
Python 177 14 Updated Nov 13, 2025

A tool to transform Chromium browsers into a C2 Implant

JavaScript 505 69 Updated Nov 21, 2025

A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office365 users.

HTML 150 17 Updated Jul 31, 2025
Next