Highlights
- Pro
Starred repositories
A Rust template for writing Beacon Object Files (BOFs)
Real-time global intelligence dashboard — AI-powered news aggregation, geopolitical monitoring, and infrastructure tracking in a unified situational awareness interface
Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specifically used for phishing and IA operations.
Example of call stack spoofing trough the construction of syntetic frames and stack manipulation
Autonomous multi-session AI coding
An agentic skills framework & software development methodology that works.
A next.js web application that integrates AI capabilities with draw.io diagrams. This app allows you to create, modify, and enhance diagrams through natural language commands and AI-assisted visual…
An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard history.
AGENTS.md — a simple, open format for guiding coding agents
Backup automation for self-hosters. Built on top of restic
Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities.
Open Source Vulnerability Management Platform
This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engagements, I noticed that Microsoft Teams conversations often con…
The command center for coding agents - Run a team of Claude Code, OpenCode, Codex, or any other agents on your machine
Slides & Code snippets for a workshop held @ x33fcon 2024
A modular vulnerability scanner with automatic report generation capabilities.
Credential Shuffle was created by SpecterOps to teach players about BloodHound’s nodes and edges, attack paths, detection possibilities, and remediation strategies in a fun, engaging way. It’s like…
A Dockerized build pipeline for custom Windows x64 shellcode
Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan in-memory .NET assembly loads. This tool unhooks that functi…