Skip to content
View r0bag's full-sized avatar

Block or report r0bag

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Situational Awareness commands implemented using Beacon Object Files

C 1,337 226 Updated Jan 6, 2025

Hardcore Debugging

821 104 Updated Jan 30, 2025

"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.

Python 5,056 742 Updated Feb 8, 2025

The repo contains a series of challenges for learning Frida for Android Exploitation.

975 143 Updated Jul 26, 2024

A Bind Shell Using the Fax Service and a DLL Hijack

C 326 85 Updated May 3, 2020

SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)

Python 257 27 Updated Mar 5, 2025

Utility to craft HTML or SVG smuggled files for Red Team engagements

C# 234 27 Updated Mar 19, 2024

Burpsuite Extension to bypass 403 restricted directory

Python 1,597 206 Updated Jun 29, 2023

A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.

C# 389 35 Updated Jan 10, 2025

An evolving how-to guide for securing a Linux server.

17,900 1,144 Updated Oct 19, 2024
JavaScript 79 7 Updated Feb 24, 2025

Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).

C 133 22 Updated May 6, 2023

Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it wi…

PowerShell 935 135 Updated Dec 6, 2024

Posts about different topics

36 8 Updated Mar 12, 2024

Loading Remote AES Encrypted PE in memory , Decrypted it and run it

C++ 918 194 Updated Aug 29, 2023

An open source threat modeling tool from OWASP

JavaScript 1,047 274 Updated Mar 9, 2025

Spartacus DLL/COM Hijacking Toolkit

C# 1,027 139 Updated Feb 1, 2024

A small reverse shell for Linux & Windows

Go 596 109 Updated Jun 5, 2024

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Go 11 7 Updated Mar 22, 2021

Wiki to collect Red Team infrastructure hardening resources

4,228 902 Updated Apr 5, 2024

PoCs and tools for investigation of Windows process execution techniques

C# 908 141 Updated Mar 12, 2025

A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.

Python 505 73 Updated Aug 1, 2022

Simple (relatively) things allowing you to dig a bit deeper than usual.

C 3,314 541 Updated Jan 21, 2025

Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environmen…

Go 741 129 Updated Aug 18, 2023

Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.

Python 201 41 Updated Jul 2, 2017

A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.

C 1,821 229 Updated Apr 7, 2024

Windows x64 handcrafted token stealing kernel-mode shellcode

Assembly 506 60 Updated Apr 17, 2024

RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.

1,763 304 Updated May 23, 2024
Next