Skip to content
View leebaird's full-sized avatar

Block or report leebaird

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Get up and running with Llama 3.3, DeepSeek-R1, Phi-4, Gemma 3, and other large language models.

Go 135,047 11,199 Updated Mar 28, 2025

EDR & Antivirus Bypass to Gain Shell Access

C# 234 42 Updated Sep 30, 2024

Simple Python version management

Roff 41,432 3,146 Updated Mar 27, 2025

A tool matrix for Russian APTs based on the Ransomware Tool Matrix

202 37 Updated Nov 10, 2024

ShellCheck, a static analysis tool for shell scripts

Haskell 37,141 1,800 Updated Dec 14, 2024

a simple app for uploading files using node.js and express

EJS 36 33 Updated Nov 26, 2022

Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection

C++ 286 65 Updated May 17, 2024

A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.

182 32 Updated Jan 27, 2025

Shodan Dorks

457 95 Updated Mar 31, 2023

Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).

C# 532 57 Updated Mar 19, 2024

SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.

Python 1,056 129 Updated Mar 6, 2025

Collection of UAC Bypass Techniques Weaponized as BOFs

C 486 64 Updated Feb 21, 2024

A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.

C 335 41 Updated Feb 10, 2025

GregsBestFriend process injection code created from the White Knight Labs Offensive Development course

C++ 184 35 Updated Jun 23, 2023

The Network Execution Tool

Python 3,705 422 Updated Mar 27, 2025

Encrypted shellcode Injection to avoid Kernel triggered memory scans

C 366 41 Updated Sep 12, 2023

Send phishing messages and attachments to Microsoft Teams users

Python 1,069 138 Updated Jun 19, 2024

PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.

C 397 45 Updated Jun 15, 2024

Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!

Python 1,099 138 Updated Jul 18, 2024

A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWHF 2018 security conference

Shell 620 104 Updated Jan 31, 2023

Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+Bloc…

C 657 90 Updated Mar 12, 2025

Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and notes on usage.

Go 123 34 Updated Jun 30, 2024

Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.

JavaScript 2,108 263 Updated Feb 25, 2023

Dehashed API CLI

Python 20 6 Updated Oct 26, 2020

Official electron build of draw.io

JavaScript 53,500 5,202 Updated Mar 27, 2025

Some scripts to abuse kerberos using Powershell

PowerShell 328 44 Updated Jul 27, 2023

Malicious shortcut generator for collecting NTLM hashes from insecure file shares.

Python 325 58 Updated Oct 22, 2024

Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!

1,576 198 Updated Mar 19, 2025

Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.

C++ 791 127 Updated Jul 2, 2024

An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer

Python 707 70 Updated May 19, 2023
Next
Showing results