8000 cxnturi0n (Fabio Cinicolo) / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View cxnturi0n's full-sized avatar
:shipit:
:shipit:

Highlights

  • Pro

Block or report cxnturi0n

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Linux Binary Exploitation

C 1,334 211 Updated Jun 15, 2021

CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).

JavaScript 124 11 Updated Mar 31, 2025

Cybersecurity AI (CAI), an open Bug Bounty-ready Artificial Intelligence

Python 1,555 190 Updated Jul 3, 2025

MCP Server for Ghidra

Java 5,310 380 Updated Jun 23, 2025

RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging

C++ 193 34 Updated Mar 6, 2025

A command line C# REPL with syntax highlighting – explore the language, libraries and nuget packages interactively.

C# 3,159 115 Updated Jul 1, 2025

EDR Lab for Experimentation Purposes

C++ 1,288 141 Updated Jul 2, 2025

Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"

139 10 Updated Aug 15, 2024

Adversary Emulation Framework

Go 9,609 1,301 Updated Jun 30, 2025

Simple (relatively) things allowing you to dig a bit deeper than usual.

C 3,376 547 Updated Mar 12, 2025

This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…

Python 683 119 Updated Apr 25, 2025

Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA …

C++ 400 78 Updated Jun 14, 2025

High performance UI layout library in C.

C 14,711 560 Updated Jul 1, 2025

Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.

C# 1,232 145 Updated Jun 1, 2024

A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.

Rust 166 20 Updated Apr 26, 2025

control your Linux OS computer through Telegram

Python 135 38 Updated Dec 27, 2021

「🔑」A tool used to hunt down API key leaks in JS files and pages

Go 717 85 Updated Mar 21, 2025

POC FortiOS SSL-VPN buffer overflow vulnerability

Python 27 15 Updated Jun 16, 2023

Collection of PoC and offensive techniques used by the BlackArrow Red Team

C 1,124 191 Updated Jul 19, 2024

A tool to fastly get all javascript sources/files

Go 803 111 Updated Jul 4, 2025

Rust Weaponization for Red Team Engagements.

Rust 2,858 320 Updated Apr 25, 2024

Manipulating and Abusing Windows Access Tokens.

C++ 278 46 Updated Jan 15, 2021

Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.

Python 704 70 Updated Oct 19, 2024
Python 870 280 Updated Dec 24, 2023
JavaScript 1 Updated Apr 18, 2024
JavaScript 315 49 Updated Jun 18, 2025

LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and remote file transmission.

Rust 351 46 Updated Apr 26, 2025

A powerful little TUI framework 🏗

Go 32,872 930 Updated Jul 3, 2025
Next
0