Skip to content
View r4mos's full-sized avatar

Block or report r4mos

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results
Python 102 15 Updated Nov 10, 2023

Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC

C# 311 30 Updated Jan 6, 2025

Open-source Windows and Office activator featuring HWID, Ohook, KMS38, and Online KMS activation methods, along with advanced troubleshooting.

Batchfile 112,492 10,824 Updated Jan 17, 2025

A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables tha…

C++ 284 52 Updated Oct 7, 2024

Custom Selenium Chromedriver | Zero-Config | Passes ALL bot mitigation systems (like Distil / Imperva/ Datadadome / CloudFlare IUAM)

Python 10,442 1,183 Updated Jun 25, 2024

Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.

Go 946 175 Updated Nov 12, 2024

Ready to go Phishing Platform

JavaScript 899 158 Updated Jul 23, 2024

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Go 11,873 2,082 Updated Aug 21, 2024

Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry

C# 364 35 Updated Aug 2, 2024

Zero Infrastructure Password Cracking

PowerShell 399 60 Updated Aug 22, 2024

Burp Plugin to Bypass WAFs through the insertion of Junk Data

Python 999 103 Updated Jan 18, 2025

Easily and securely send things from one computer to another 🐊 📦

Go 28,573 1,130 Updated Jan 15, 2025

A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.

PowerShell 1,857 329 Updated Dec 19, 2024

一款后渗透免杀工具,助力每一位像我这样的脚本小子快速实现免杀,支持bypass AV/EDR 360 火绒 Windows Defender Shellcode Loader

C++ 1,191 119 Updated Sep 1, 2024

KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.

Python 1,325 241 Updated Jan 12, 2025

File formats dissections and more...

Assembly 10,646 747 Updated Feb 18, 2024

Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)

AutoIt 422 59 Updated Feb 24, 2022

Fluxion is a remake of linset by vk496 with enhanced functionality.

HTML 5,080 1,411 Updated Nov 3, 2023

An ADCS honeypot to catch attackers in your internal network.

Jinja 248 22 Updated Jun 27, 2024

Prowler is an Open Cloud Security tool for AWS, Azure, GCP and Kubernetes. It helps for continuos monitoring, security assessments and audits, incident response, compliance, hardening and forensics…

Python 11,083 1,578 Updated Jan 17, 2025

Polymorphic Command & Control

Python 62 5 Updated Oct 2, 2024

Multiplatform Python WebShell

Python 300 59 Updated Sep 27, 2024

The Shadow Attack Framework

PowerShell 1,093 501 Updated Sep 4, 2022

Red team Interview Questions

622 72 Updated Jul 23, 2024

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static a…

JavaScript 17,888 3,279 Updated Dec 19, 2024

Dex to Java decompiler

Java 42,562 4,957 Updated Jan 13, 2025

LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping

Python 1,323 182 Updated Nov 26, 2024
Next