Skip to content
Practicing classic Sasquatch behaviors
Practicing classic Sasquatch behaviors



@blackhillsinfosec @DerpConInfosec @Porchetta-Industries


@Maleick @thegeekdiver @jonaslejon @RedDevilSecurity @Clutchisback1 @dtyj @tnkr @bennettwarner @0xtavian @mitnicksecurity @0xSV1 @chkconfig @kovidonat

You found me!


  1. An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

    Boo 1.5k 305

  2. A swiss army knife for pentesting networks

    Python 4.3k 1k

  3. Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient

    Python 712 150

  4. Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.

    Python 403 64

  5. Toolbox containing research notes & PoC code for weaponizing .NET's DLR

    PowerShell 335 89

  6. My experiments in weaponizing Nim (

    Nim 505 29

145 contributions in the last year

Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Mon Wed Fri
Activity overview

Contribution activity

December 2020

byt3bl33d3r has no activity yet for this period.

November 2020

Created 1 repository

Created an issue in SnaffCon/Snaffler that received 2 comments

Snaffler doesn't write log file when executed reflectively

Heya, I'm on a gig where the client has whitelisting enabled but hasn't locked down powershell. So while I can't run the snaffler executable direct…


Seeing something unexpected? Take a look at the GitHub profile guide.

You can’t perform that action at this time.