Skip to content
Offensive Sencha Consultant
Offensive Sencha Consultant



Block or Report

Block or report mgeeky

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

mgeeky's code lair

LinkedIn Twitter GitHub

Hi! I'm Mariusz, an Offensive Security afficionado. Been solving IT Security problems from both defensive and offensive sides of the barricade for more than 14 years by now out of which seven profesionally. I was always more attracted to sharing knowledge through my code, tools, scripts, exploits rather than writing blog posts. With that on the table, this Github account acts as my legacy. 😄

I specialize in Windows & Networks security assessment. Started as a Malware Analyst, pushed my career through all sorts of technical roles & challenges to land myself in Red Team operator's shoes evaluating holistically my Customer's cyber-defensive programmes.

Career Milestones Certifications acquired
ING Tech Poland: Red Team Operator PentesterAcademy Certified Red Team Professional (CRTP)
MWR InfoSecurity (F-Secure): Cyber Security Consultant eLearnSecurity Certified Penetration Tester Extreme (eCPTX)
Santander Bank Poland (BZWBK): Senior Cybersecurity Auditor CREST Registered Tester (CRT) Penetration Tester, Malware Analysis trainer CCNA 200-125
ESET: Malware Researcher, Specialized Software Developer Offensive Security Certified Expert (OSCE)
Offensive Security Wireless Professional (OSWP)
Offensive Security Certified Professional (OSCP)

Welcome to my Github lair where you'll find all sorts of security-related tools of hopefully decent quality.

📈 My GitHub Stats

mgeeky's GitHub Stats


  1. A collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at lea…

    PowerShell 703 168

  2. My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+

    287 57

  3. Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation

    Python 285 45

  4. OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup

    C# 224 32

  5. Apache Tomcat auto WAR deployment & pwning penetration testing tool.

    Python 299 110

  6. UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware

    C++ 93 15

381 contributions in the last year

Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Mon Wed Fri
Activity overview
Contributed to mgeeky/RedWarden, mgeeky/Penetration-Testing-Tools, mgeeky/SharpWebServer and 5 other repositories

Contribution activity

Seeing something unexpected? Take a look at the GitHub profile guide.