-
President at @Cyber-Info
- Everywhere
- w33t.io
- https://orcid.org/0009-0007-9245-0939
- @w33t_io
Highlights
Lists (16)
Sort Name ascending (A-Z)
Stars
RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust 🦀
PoC that downloads an executable from a public SSL certificate
A Reverse Shell malware RCE for educational purposes
User-friendly AI Interface (Supports Ollama, OpenAI API, ...)
an obfuscator based on LLVM which can obfuscate the program execution trajectory
A single Gradio + React WebUI with extensions for ACE-Step, Kimi Audio, Piper TTS, GPT-SoVITS, CosyVoice, XTTSv2, DIA, Kokoro, OpenVoice, ParlerTTS, Stable Audio, MMS, StyleTTS2, MAGNet, AudioGen, …
A collaborative, multi-platform, red teaming framework
💎 🐳 A super customizable Jekyll theme for personal site, team site, blog, project, documentation, etc.
Looking for those jamming files that were removed from custom firmwares? Here they are. Only for educational purposes, of course.
List of Google Dorks for sites that have responsible disclosure program / bug bounty program
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
Decoders and Rules for Fortigate in Wazuh
FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading
Malware persistence via COM DLL hijacking. C++ implementation example
A curated list of awesome malware persistence tools and resources.
Collection of malware persistence and hunting information. Be a persistent persistence hunter!
Demos of various (also non standard) persistence methods used by malware
A collection of scripts I've written to help red and blue teams with malware persistence techniques.
Zero-Day Code Injection and Persistence Technique