Skip to content
View ASkyeye's full-sized avatar
:octocat:
Super Hacker Bot - Verified by Github
:octocat:
Super Hacker Bot - Verified by Github

Block or report ASkyeye

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. FilelessRemotePE FilelessRemotePE Public

    Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique

    C++ 61 156

  2. CVE-2023-21839 CVE-2023-21839 Public

    Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)

    Go 53 108

  3. CobaltPatch CobaltPatch Public

    Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be Appended In Stage / Post-Ex Blocks. Made for C Programmers

    C 37 16

  4. MSBuild-AL-Bypass MSBuild-AL-Bypass Public

    Forked from 0xm4ud/MSB-AL-Bypass

    C# shellcode runner adapted to run from a csproj to be triggered by MSBuild

    25 1

  5. CVE-2018-19320 CVE-2018-19320 Public

    Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)

    C++ 20 26

  6. ImpulsiveDLLHijack ImpulsiveDLLHijack Public

    Forked from knight0x07/ImpulsiveDLLHijack

    C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.

    C# 17 4