Skip to content
View 0xbad53c's full-sized avatar

Block or report 0xbad53c

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
  • resolvers Public

    Forked from trickest/resolvers

    The most exhaustive list of reliable DNS resolvers.

    MIT License Updated Apr 7, 2025
  • Offensive Security (Now OffSec) badges that can be used with e.g. https://modulari.com to put on your wall. I recommend selecting plexiglass hexagons.

    2 Updated Jan 11, 2025
  • npk Public

    Forked from c6fc/npk

    A mostly-serverless distributed hash cracking platform

    JavaScript Updated Nov 22, 2024
  • Alpine Linux Docker container to statically compile Nmap.

    Dockerfile 1 Updated Sep 7, 2024
  • Dockerfiles to build containers with mingw-w64

    Dockerfile Updated Sep 7, 2024
  • Deploying Ansible playbooks & roles to EC2 instances via Terraform from anywhere without interruption and without accessing SSH.

    HCL Updated Aug 29, 2024
  • Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.

    25 4 GNU General Public License v2.0 Updated Aug 16, 2024
  • C GNU General Public License v2.0 Updated Jun 14, 2024
  • A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.

    C Updated Jun 1, 2024
  • webshells Public

    My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the internet.

    Java 20 5 Updated May 20, 2024
  • Nmap NSE script to identify Debian, Ubuntu, FreeBSD version based on default SSH banner response. Intended for Penentration Testing, OSCP/PWK, HackTheBox (HTB), TryHackMe, RootMe

    Lua MIT License Updated Dec 21, 2023
  • BokuLoader Public

    Forked from boku7/BokuLoader

    A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

    C MIT License Updated Nov 17, 2023
  • The ultimate WinRM shell for hacking/pentesting

    Ruby GNU Lesser General Public License v3.0 Updated Apr 21, 2023
  • CattleStorm Public

    Python wrapper script to interact with the BeEF (https://github.com/beefproject/beef) API and execute modules on all connected zombie browsers at the same time.

    Python 3 1 Updated Mar 31, 2023
  • An Ansible role for installing Cobalt Strike.

    HCL Creative Commons Zero v1.0 Universal Updated Mar 13, 2023
  • Simple docker file to start an SMB share with impacket smbserver

    Dockerfile Updated Jan 26, 2023
  • Collection of docker oneliners to save time when compiling/running projects for security research & development.

    2 1 Updated Nov 11, 2022
  • VBA 5 1 MIT License Updated Oct 25, 2022
  • A repository of sysmon configuration modules

    PowerShell MIT License Updated Sep 1, 2022
  • Fast and customizable vulnerability scanner For JIRA written in Python

    Python MIT License Updated Aug 23, 2022
  • WhatWeb Public

    Forked from urbanadventurer/WhatWeb

    Next generation web scanner

    Ruby GNU General Public License v2.0 Updated Aug 12, 2022
  • confused Public

    Forked from visma-prodsec/confused

    Tool to check for dependency confusion vulnerabilities in multiple package management systems

    Go MIT License Updated Aug 11, 2022
  • Python MIT License Updated Aug 5, 2022
  • osed-tools Public

    Tools/scripts I used/developed during the EXP-301 course.

    Python 19 7 Updated May 17, 2022
  • webshell Public

    Forked from tennc/webshell

    This is a webshell open source project

    PHP MIT License Updated Mar 24, 2022
  • SourcePoint Public

    Forked from Tylous/SourcePoint

    SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.

    Go Updated Feb 19, 2022
  • Our collection of Wazuh detection rules for our Offense Lab

    14 2 Updated Feb 13, 2022
  • bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)

    Python MIT License Updated Jan 9, 2022
  • Advanced Sysmon configuration, Installer & Auto Updater with high-quality event tracing

    Batchfile Updated Dec 5, 2021
  • auditd Public

    Forked from Neo23x0/auditd

    Fork with customisation for partial integration into Wazuh for our detection lab.

    2 Apache License 2.0 Updated Dec 5, 2021