8000 makheo / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View makheo's full-sized avatar

Block or report makheo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Azure JWT Token Manipulation Toolset

PowerShell 671 109 Updated Dec 6, 2024

io_uring based rootkit

Go 208 24 Updated Apr 24, 2025

Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in user mode, no admin rights required.

C 781 135 Updated Jul 4, 2025

LibTomCrypt is a fairly comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining …

C 1,677 479 Updated May 6, 2025

365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.

PHP 514 92 Updated Jun 27, 2025

Adversary simulation and Red teaming platform with AI

4,405 591 Updated Jul 1, 2025

PoC for CVE-2025-22457

Ruby 66 14 Updated Apr 25, 2025

PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways

Ruby 45 12 Updated Jan 16, 2025

Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities

C 15 5 Updated Feb 23, 2023

Dump cookies and credentials directly from Chrome/Edge process memory

C++ 1,261 120 Updated Nov 26, 2024

BPFDoor Source Code. Originally found from Chinese Threat Actor Red Menshen

C 247 99 Updated May 11, 2022

Passwords Recovery Tool

C 224 77 Updated Feb 3, 2021

✨Spark is a web-based, cross-platform and full-featured Remote Administration Tool (RAT) written in Go that allows you control all your devices anywhere. Spark是一个Go编写的,网页UI、跨平台以及多功能的远程控制和监控工具,你可以随时…

Go 2,117 555 Updated Jun 7, 2025

Collection of Notes and CheatSheets used for Red teaming Certs

392 90 Updated Feb 13, 2023

ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.

C++ 150 20 Updated Jul 25, 2024

Unauthenticated Remote Code Execution – Bricks <= 1.9.6

Python 168 36 Updated Feb 25, 2024

APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover su…

Python 1,349 244 Updated Nov 7, 2024

A script to generate AV evaded(static) DLL shellcode loader with AES encryption.

C++ 130 32 Updated Mar 28, 2025

CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File

Python 312 51 Updated Mar 20, 2025

A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and reflection techniques for code injection. This PoC showcases…

C++ 303 47 Updated Mar 6, 2025

his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attac…

Python 144 35 Updated Mar 14, 2025

Fast web fuzzer written in Go

Go 14,237 1,409 Updated Apr 24, 2025

Demonized Shell is an Advanced Tool for persistence in linux.

Shell 387 55 Updated Jan 5, 2025

POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY

C++ 196 32 Updated Apr 12, 2025

This repo is about Active Directory Advanced Threat Hunting

PowerShell 623 86 Updated Feb 17, 2025

The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

C 197 24 Updated Jan 20, 2024

A curated list of tools for incident response

8,246 1,583 Updated Jul 18, 2024
Next
0