Skip to content
View samratashok's full-sized avatar

Organizations

@AlteredSecurity

Block or report samratashok

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…

C++ 572 91 Updated May 22, 2025

Yet another shellcode loader - but a sneaky one

C 25 2 Updated Apr 16, 2025

MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.

C++ 125 9 Updated Dec 6, 2024

CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)

C 300 56 Updated Sep 28, 2021

Abusing Azure services over C2

C# 368 34 Updated Jan 20, 2026

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.

C# 336 32 Updated Aug 7, 2024

A Python script to find tenant id an region from a list of domain names.

Python 16 1 Updated Jan 31, 2025

M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response capabilities.

Python 323 21 Updated Oct 12, 2025

Providing Azure pipelines to create an infrastructure and run Atomic tests.

Bicep 53 6 Updated Jul 25, 2023

Protected Process Dumper Tool

Go 577 64 Updated Aug 30, 2023

Some scripts to abuse kerberos using Powershell

PowerShell 355 46 Updated Jul 27, 2023

Timeroasting scripts by Tom Tervoort

Python 387 44 Updated Nov 11, 2025
Python 88 16 Updated Jul 28, 2022

WNF Code Execution Library Using C#

C# 110 21 Updated May 18, 2020

Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs

Go 1,230 169 Updated Aug 18, 2023

Start new PowerShell without etw and amsi in pure nim

Nim 157 24 Updated Feb 14, 2022

AzureRT - A Powershell module implementing various Azure Red Team tactics

PowerShell 233 31 Updated Jun 17, 2022

Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.

C# 883 74 Updated Apr 8, 2025

Kernel mode WinDbg extension and PoCs for token privilege investigation.

C# 900 128 Updated Jan 21, 2025

A small POC to make defender useless by removing its token privileges and lowering the token integrity

C++ 690 127 Updated Jun 28, 2022

Remote Desktop entirely coded in PowerShell.

PowerShell 2,224 264 Updated Aug 1, 2024

Collection of KQL queries

1,611 374 Updated Jan 29, 2026

The swiss army knife of LSASS dumping

C 2,072 262 Updated Sep 17, 2024

PIC lsass dumper using cloned handles

C 595 109 Updated Oct 18, 2022

GoldenSAML Attack Libraries and Framework

Python 77 10 Updated Jun 5, 2024

Understand adversary tradecraft and improve detection strategies

PowerShell 712 76 Updated Mar 9, 2023

A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365

PowerShell 789 84 Updated Oct 29, 2022

O365 Education tools and scripts repository

PowerShell 212 396 Updated Jan 6, 2026

Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.

PowerShell 69 19 Updated Jul 10, 2024
Next