Skip to content
View mertdas's full-sized avatar

Block or report mertdas

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

COM Hijacking VOODOO

C 369 58 Updated Nov 27, 2025

A Dockerized build pipeline for custom Windows x64 shellcode

Python 52 8 Updated Dec 12, 2025

Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and penetration testing

PowerShell 104 21 Updated Dec 7, 2025

A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.

Go 125 14 Updated Nov 12, 2025

Your template-based BloodHound terminal companion tool

Python 445 37 Updated Aug 17, 2025

Proof of Concepts code for Bring Your Own Vulnerable Driver techniques

C 88 21 Updated Aug 21, 2025

Exploitable drivers, you know what I mean

154 26 Updated Nov 16, 2025

Local SYSTEM auth trigger for relaying - X

C 155 16 Updated Jul 23, 2025

Aggressor script add-in for CobaltStrike to track file uploads

49 8 Updated Nov 7, 2022

A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader

C 45 6 Updated Sep 25, 2024

onedrive user enumeration - pentest tool to enumerate valid o365 users

Python 735 90 Updated Jul 29, 2025

Updated version of a long known self deletion technique to work with 24H2.

C 61 3 Updated Jun 9, 2025

Python3 utility for creating zip files that smuggle additional data for later extraction

Python 263 26 Updated May 15, 2025

Linker for Beacon Object Files

Rust 146 13 Updated Dec 22, 2025

SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.

C# 369 58 Updated Sep 26, 2025

Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit

C++ 62 14 Updated May 6, 2025

BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).

Rust 504 81 Updated Oct 15, 2025

Rid_enum is a null session RID cycle attack for brute forcing domain controllers.

Python 303 87 Updated Jul 28, 2024

Less sugar (entropy) for your binaries

Go 34 5 Updated Sep 10, 2025

PrivCheck is a collection of Beacon Object Files designed to detect privilege escalation vulnerabilities in Windows OS by identifying common misconfigurations.

C 9 Updated Jan 31, 2025

Tool for Active Directory Certificate Services enumeration and abuse

Python 163 18 Updated Apr 17, 2025

A list of resources for those interested in getting started in bug bounties

11,724 2,014 Updated Jul 23, 2024

Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and scripts have been written and published, but they can be cha…

CSS 398 28 Updated Jan 13, 2026

Cobalt Strike系列

2,403 595 Updated Dec 3, 2023

A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies

33 7 Updated Sep 15, 2022

Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.

C 184 27 Updated Feb 11, 2021

Cobalt Strike random C2 Profile generator

Python 16 2 Updated Nov 10, 2025

FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading

Rust 397 50 Updated Sep 26, 2024

BOF for C2 framework

C 44 8 Updated Nov 9, 2024

Select any exported function in a dll as the new dll's entry point.

Rust 81 17 Updated Oct 25, 2024
Next