Skip to content
View mlcsec's full-sized avatar

Block or report mlcsec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare

Python 216 14 Updated Oct 17, 2025

Your template-based BloodHound terminal companion tool

Python 433 35 Updated Aug 17, 2025

A tool to transform Chromium browsers into a C2 Implant

JavaScript 497 67 Updated Oct 28, 2025

C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, pivot and more.

C++ 164 26 Updated Oct 8, 2025

🧙‍♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications

JavaScript 1,224 205 Updated Jun 17, 2025

An example reference design for a proposed BOF PE

C++ 187 21 Updated Apr 17, 2025

Reaping treasures from strings in remote processes memory

C 271 21 Updated Feb 8, 2025

iOS and macOS Decompiler

Java 2,482 81 Updated Aug 26, 2025

COM ViewLogger — new malware keylogging technique

C++ 393 56 Updated Jan 6, 2025

.NET assembly loader with patchless AMSI and ETW bypass

C 355 51 Updated Apr 19, 2023

TokenCert

C# 100 10 Updated Nov 15, 2024
C# 417 40 Updated Apr 22, 2025

PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configuration Manager

Python 399 63 Updated May 29, 2024
Python 77 10 Updated Jan 26, 2025

Embed a payload inside a PNG file

C 356 49 Updated Oct 24, 2024

Azure DevOps Services Attack Toolkit

C# 150 62 Updated Mar 15, 2025

Beacon Object File Loader

C 297 39 Updated Dec 3, 2023

Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.

C 126 10 Updated Oct 4, 2024

Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies

C# 263 30 Updated Dec 27, 2024

A set of programs for analyzing common vulnerabilities in COM

C++ 235 40 Updated Sep 8, 2024

BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions

C++ 331 42 Updated Nov 19, 2024

Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io

Python 83 5 Updated Aug 5, 2024

The recursive internet scanner for hackers. 🧡

Python 9,082 749 Updated Nov 1, 2025

Bounces when a fish bites - Evilginx database monitoring with exfiltration automation

Python 181 15 Updated Jun 9, 2024

Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit

Python 156 15 Updated Dec 7, 2024

A small script that automates Entra ID persistence with Windows Hello For Business key

Python 62 6 Updated Feb 16, 2025

Tools for analyzing EDR agents

C++ 266 25 Updated Jun 10, 2024

Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.

Nim 85 8 Updated Jul 11, 2025
Next