Skip to content
View py7hagoras's full-sized avatar
🤩
L337
🤩
L337

Block or report py7hagoras

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of almost any SYSTEM process.

C# 108 27 Updated Feb 14, 2023

Binance MCP Server

JavaScript 4 Updated Apr 24, 2025

AI powered system that classifies threat alerts into their various Mitre tactics and techniques

Python 1 1 Updated Apr 22, 2025

Source for tasks I have used with Covenant

C# 120 27 Updated Mar 21, 2021
PowerShell 1 Updated Jan 3, 2024

Flutter Reverse Engineering Framework

Python 2,304 264 Updated Sep 13, 2025

Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.

5,907 1,173 Updated Aug 14, 2024

A very vulnerable web site written in NodeJS with the purpose of have a project with identified vulnerabilities to test the quality of security analyzers tools tools

JavaScript 479 730 Updated Aug 20, 2024
JavaScript 4 4 Updated Mar 12, 2022

OriginTrail Decentralized Knowledge Graph network node

JavaScript 224 82 Updated Oct 30, 2025

Community curated list of templates for the nuclei engine to find security vulnerabilities.

JavaScript 11,303 3,140 Updated Nov 13, 2025

A toolbox for extracting RSA private keys from public keys.

Python 189 25 Updated Sep 30, 2021

A python script for testing Aws Cognito IdentityPoolId

Python 1 1 Updated Feb 1, 2023

Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading

C# 850 110 Updated Jul 21, 2020

Strings replace for Grunt source templates

Python 4 1 Updated Jul 11, 2021

A collection of my Frida instrumentation scripts to reverse engineer mobile apps and more.

JavaScript 1,508 247 Updated Nov 10, 2025

Clone of Whatsapp Web's current UI.

JavaScript 729 199 Updated Mar 2, 2024

A .NET tool for exporting and importing certificates without touching disk.

C# 497 69 Updated Oct 8, 2021

A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.

C# 1,359 470 Updated Jul 27, 2025

ScareCrow - Payload creation framework designed around EDR bypass.

Go 2,859 521 Updated Aug 18, 2023

Hardened Proof of Concept of D/Invoke Process Injection malware

C# 42 6 Updated Jul 23, 2020

D/Invoke port of UrbanBishop

C# 108 26 Updated Jul 19, 2020

Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.

C# 762 113 Updated Dec 21, 2022

A simple python script for doing brute-force attack using selenium.

Python 14 2 Updated Apr 15, 2024

Tool for catching and logging different types of requests.

Go 220 25 Updated Nov 20, 2020

Collection of Beacon Object Files

C 617 115 Updated Nov 1, 2022

Adversary Tactics - PowerShell Training

PowerShell 1,562 339 Updated Jan 22, 2020

Fileless lateral movement tool that relies on ChangeServiceConfigA to run command

C 1,561 254 Updated Jul 10, 2023

A collection of tools to abuse chrome browser

C++ 297 59 Updated Jan 15, 2021

Use ICMLuaUtil to Bypass UAC!

C# 590 74 Updated Apr 19, 2020
Next