Skip to content
View RCStep's full-sized avatar

Block or report RCStep

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Collection of extracted Microsoft Defender data for security research purposes

230 34 Updated Jun 23, 2022

Opinionated defaults, documentation, and workflows for Claude Code at Trail of Bits

Shell 1,008 71 Updated Feb 17, 2026

Bluetooth Low Energy (BLE) scanner with Resolvable Private Address (RPA) resolution using Identity Resolving Keys (IRKs)

Python 140 18 Updated Feb 18, 2026

POC tools for exploring SMB over QUIC protocol

C 132 15 Updated Apr 6, 2022

wspcoerce coerces a Windows computer account via SMB to an arbitrary target using MS-WSP

Python 133 12 Updated Nov 24, 2025

PoC to coerce authentication from Windows hosts using MS-WSP

C# 303 40 Updated Sep 7, 2023

Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-native executables.

PowerShell 267 43 Updated Feb 13, 2026

ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native executables.

TypeScript 400 50 Updated Feb 13, 2026

A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.

Go 258 23 Updated Sep 23, 2025

Project for identifying executables and DLLs vulnerable to environment-variable based DLL hijacking.

Shell 63 9 Updated Jul 15, 2022

Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in this exciting journey and add your expertise to our collective …

C++ 205 57 Updated Sep 20, 2025

Project for tracking publicly disclosed DLL Hijacking opportunities.

886 112 Updated Feb 3, 2026

Titanis Backup Operator

C# 2 Updated Feb 11, 2026

MacOS Shared Library to Shellcode Loader

Assembly 49 4 Updated Feb 15, 2026

Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11

C# 82 9 Updated Jan 26, 2026

Homemade Aggressor scripts kit for Cobalt Strike

93 19 Updated Nov 25, 2025

Library that provides Python examples for interacting with the Cobalt Strike REST API

Jupyter Notebook 24 3 Updated Nov 26, 2025

COM Hijacking VOODOO

C 375 59 Updated Nov 27, 2025

Library that provides Aggressor Script functions for interacting with the Cobalt Strike REST API from the client

3 1 Updated Dec 19, 2025

MCP Server for Cobalt Strike interaction.

Python 10 2 Updated Dec 19, 2025

template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.

C 101 18 Updated Jan 10, 2026

A PoC web interface for interacting with Cobalt Strike through its REST API.

HTML 4 2 Updated Jan 14, 2026

An interactive command line application for red team operations.

Python 2 1 Updated Jan 21, 2026

A Research POC on Post-Exploitation Credential Collection through Chromium Browsers

PowerShell 9 1 Updated Feb 2, 2026

Locate dlls and function addresses without PEB Walk and EAT parsing

Rust 104 9 Updated Nov 7, 2025

PoC demonstrating Cursor's vulnerability to tasks.json hijacking.

4 Updated Jan 23, 2026

Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bookmarks from modern Chromium-based and Gecko-based browsers …

C 544 79 Updated Feb 14, 2026

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

TypeScript 205,875 37,579 Updated Feb 18, 2026
Next