Skip to content
View mr-r3bot's full-sized avatar
😋
Happy
😋
Happy

Block or report mr-r3bot

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stage…

Rust 1,050 173 Updated Mar 5, 2026

Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows

C++ 38 14 Updated Feb 18, 2019

A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library

Rust 24 1 Updated Nov 13, 2025

Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.

Nim 259 31 Updated Mar 5, 2026

Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB

Python 24 1 Updated Jun 27, 2025

Exposing CharmingKitten's malicious activity for IRGC-IO Counterintelligence division (1500)

C# 429 98 Updated Oct 27, 2025

A list of OSINT tools & resources for (fraud-)investigators, CTI-analysts, KYC, AML and more.

708 100 Updated Dec 4, 2025

A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass

C 168 21 Updated Sep 22, 2025

Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread

C 264 20 Updated Aug 31, 2025

such cobaltstrike loder to bypass av

C++ 1 Updated Sep 30, 2024

Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.

C++ 606 68 Updated Feb 2, 2026

A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.

C 1,369 216 Updated Oct 27, 2023

Simulate per-process disconnection in red team environments

C++ 112 21 Updated Jun 6, 2025

LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.

C 324 36 Updated Jan 17, 2024

HVNC for Cobalt Strike

C 1,301 199 Updated Dec 7, 2023

A tool to transform Chromium browsers into a C2 Implant

JavaScript 556 73 Updated Dec 17, 2025

A list of python tools to help create an OPSEC-safe Cobalt Strike profile.

C++ 510 60 Updated May 19, 2025

Reverse shell implant using full API emulation and virtualization for advanced EDR evasion. By abstracting execution and simulating system API calls inside a virtual machine, the implant bypasses t…

C 8 Updated Oct 6, 2024

A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.

Go 260 23 Updated Sep 23, 2025

Windows kernel and user mode emulation.

Python 1,868 276 Updated Mar 2, 2026

Rewrite and obfuscate code in compiled binaries

C++ 273 24 Updated Dec 13, 2025

Stealthily inject shellcode into an executable

Python 452 80 Updated Oct 19, 2025

A simple Sleepmask BOF example

C++ 169 30 Updated Nov 24, 2025

Analyse your malware to surgically obfuscate it

Python 520 59 Updated Dec 17, 2025

A collection of tools, scripts and personal research

Python 157 16 Updated Feb 2, 2026

An open-source, free protector for .NET applications

C# 2,802 421 Updated Jun 7, 2024

FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading

Rust 404 50 Updated Sep 26, 2024

面向红队的, 高性能高度自由可拓展的自动化扫描引擎 | A highly controllable and extensionable automated scanning engine for red teams

Go 2,014 187 Updated Feb 3, 2026
Next