Skip to content
View f1zm0's full-sized avatar

Block or report f1zm0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

Maldev

100 repositories

PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.

C 622 64 Updated Sep 26, 2023

a tool to help operate in EDRs' blind spots

Python 767 91 Updated Dec 2, 2024

Rust Weaponization for Red Team Engagements.

Rust 2,988 338 Updated Apr 25, 2024

Portable Executable reversing tool with a friendly GUI

C++ 3,489 224 Updated Nov 2, 2025

Hook system calls, context switches, page faults and more.

C++ 2,637 512 Updated May 9, 2023

Cobalt Strike UDRL for memory scanner evasion.

C 1,005 177 Updated Jun 4, 2024

Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)

Rust 575 75 Updated Jun 5, 2023

Library for interacting with LLVM IR in pure Go.

Go 1,273 84 Updated Dec 6, 2024

Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level

Go 235 34 Updated Oct 18, 2022

Zig bindings for Win32 generated by https://github.com/marlersoft/zigwin32gen

Zig 398 58 Updated Feb 16, 2026

A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)

C++ 556 72 Updated Apr 8, 2025

A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.

C++ 187 36 Updated Apr 22, 2025

RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtC…

C++ 501 108 Updated Jan 25, 2022

Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut

Go 360 55 Updated Sep 8, 2022

Custom Metasploit post module to executing a .NET Assembly from Meterpreter session

C++ 347 64 Updated Jul 21, 2020

Shikata ga nai (仕方がない) encoder ported into go with several improvements

Go 1,924 243 Updated Feb 22, 2024

x86 WinAPI hook written in pure Go

Go 50 11 Updated Feb 26, 2020

AV/EDR evasion via direct system calls.

Assembly 1,793 255 Updated Sep 3, 2022

A tool to kill antimalware protected processes

C 1,506 251 Updated Jun 19, 2021

Drive-by data exfiltration using open WiFi networks & DNS requests

C++ 157 24 Updated Nov 26, 2023

Call stack spoofing for Rust

Rust 356 38 Updated Feb 7, 2025

Frida Go bindings

Go 205 41 Updated Feb 8, 2026

miscellaneous scripts and programs

C 277 71 Updated Jan 23, 2025

PoC Implementation of a fully dynamic call stack spoofer

C++ 921 109 Updated Jul 20, 2024

Shoggoth: Asmjit Based Polymorphic Encryptor

C++ 780 100 Updated Apr 10, 2024

A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass…

C 676 89 Updated Dec 23, 2022

Obfuscate specific windows apis with different apis

C++ 1,023 179 Updated Feb 21, 2021

A modern, mod independent open source cheat for Enemy Territory

C 70 24 Updated Dec 6, 2025

x64 binary obfuscator

C++ 1,961 269 Updated Jul 14, 2023