Skip to content
View OdanBroder's full-sized avatar

Block or report OdanBroder

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A Simple Go program for Windows that will recover Google Chrome Logins

Go 82 31 Updated Feb 5, 2021

Second Version of The GoBot Botnet, But more advanced.

Go 755 219 Updated Sep 24, 2021
3 1 Updated May 16, 2024

A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk

C 473 65 Updated Jul 6, 2024

Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames

C++ 146 25 Updated Nov 23, 2025

Inject .NET assemblies into an existing process

C 508 74 Updated Jan 19, 2022

My CobaltStrike BOFS

C 165 26 Updated Jul 23, 2022

Cobalt Strike BOF for evasive .NET assembly execution

C 300 36 Updated Mar 31, 2025

Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA …

C++ 496 96 Updated Aug 14, 2025

A PowerShell console in C/C++ with all the security features disabled

C++ 341 41 Updated Oct 14, 2025

CobaltStrike 4.8 Cracked

66 15 Updated May 5, 2023

坤坤CS 基于CobaltStrike cat 4.5二开项目 添加反沙箱、反测绘。集成常用后渗透插件,开箱即用

PowerShell 252 44 Updated Apr 18, 2025

CobaltStrike资源大全

322 26 Updated Nov 1, 2025

Cobalt Strike AggressorScripts For Red Team

PowerShell 156 26 Updated Aug 4, 2021

Situational Awareness commands implemented using Beacon Object Files

C 1,671 272 Updated Jan 5, 2026

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

C++ 6,788 1,249 Updated Jul 14, 2025

Credentials recovery project

Python 10,588 2,116 Updated Sep 18, 2025

Stealthy Linux Kernel Rootkit for modern kernels (6x)

C 838 106 Updated Jan 8, 2026
Python 152 27 Updated Oct 2, 2025

C2-下一代RAT

490 55 Updated Aug 10, 2024

Take a list of domains and probe for working HTTP and HTTPS servers

Go 3,077 527 Updated Jun 22, 2024

Shellcode IDE — makes developing and analyzing shellcode much more convenient.

Python 109 11 Updated Nov 19, 2025

This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion

Python 94 7 Updated Aug 23, 2025

A 64-bit Reverse Shell in Assembly

Assembly 10 3 Updated May 7, 2025

Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)

C 8,697 1,462 Updated Sep 29, 2025

Post-exploitation scripts for OS X persistence and privesc

Python 73 25 Updated Apr 12, 2017

APT & CyberCriminal Campaign Collection

YARA 4,033 975 Updated Jul 25, 2024

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

C 3,195 822 Updated Sep 3, 2022
C# 473 58 Updated Nov 20, 2024

A workshop about Malware Development

Nim 1,751 216 Updated Jun 2, 2023
Next