Skip to content
View nick0lass's full-sized avatar

Block or report nick0lass

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
50 results for source starred repositories
Clear filter

Protection against HTML smuggling attempts.

JavaScript 91 10 Updated Mar 11, 2025

Port of Cobalt Strike's Process Inject Kit

C++ 169 23 Updated Dec 1, 2024

C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.

Python 1,049 173 Updated Jun 25, 2024

Tool to extract username and password of current user from PanGPA in plaintext

C++ 82 15 Updated Dec 23, 2024

This repo contains some Amsi Bypass methods i found on different Blog Posts.

1,856 306 Updated Nov 28, 2024

A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens

PowerShell 88 8 Updated Feb 15, 2025

Embed a payload inside a PNG file

C 298 37 Updated Oct 24, 2024

A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…

C++ 511 85 Updated Jun 12, 2024

A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables tha…

C++ 298 58 Updated Oct 7, 2024

Extract and execute a PE embedded within a PNG file using an LNK file.

Python 365 58 Updated Nov 2, 2024

SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.

Go 1,071 155 Updated Apr 2, 2024

Run PowerShell with rundll32. Bypass software restrictions.

C# 1,788 257 Updated Mar 17, 2021

Security Remediation Guides

718 177 Updated Feb 4, 2025

AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses

JavaScript 1,261 129 Updated Mar 12, 2025

A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO

Python 167 11 Updated Aug 25, 2024

A Python POC for CRED1 over SOCKS5

Python 142 13 Updated Oct 5, 2024

PoCs of RCEs against open source C2 servers

Python 80 13 Updated Sep 28, 2024

Also known by Microsoft as Knifecoat 🌶️

C# 1,128 204 Updated Dec 22, 2022

Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.

JavaScript 1,515 226 Updated Oct 26, 2024

Lab used for workshop and CTF

PowerShell 173 15 Updated Feb 5, 2025

A curated list wordlists for bruteforcing and fuzzing

879 152 Updated Sep 27, 2024

A set of GitHub actions for checking your projects for vulnerabilities

HTML 542 189 Updated Sep 6, 2024

.NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins.

C# 708 100 Updated Oct 23, 2020

SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.

C# 1,216 214 Updated Jun 27, 2024

.NET assembly loader with patchless AMSI and ETW bypass

C 319 45 Updated Apr 19, 2023

reverse engineered and improved BSQLi script from Coffinxp

Python 12 3 Updated Aug 30, 2024

Automated tool for domains & subdomains gathering

Shell 184 51 Updated Aug 24, 2023

SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the process of constructing and utilizing structures, assigning varia…

Python 129 13 Updated Nov 8, 2024

GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.

Python 254 33 Updated Mar 16, 2025
Next