Skip to content
View clod81's full-sized avatar
🔐
🔐

Block or report clod81

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Bypassing EDR's with stealthy c++ telegram Bot and Telegram itself as C2 interface !

C++ 22 4 Updated Mar 24, 2026

psexecsvc - a python implementation of PSExec's native service implementation

Python 283 26 Updated Mar 24, 2026

Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.

C# 290 58 Updated May 2, 2025

abusing windows toast notifications for fun and user manipulation

C 70 7 Updated Mar 20, 2026

A stealthier approach to WMI-based command execution using Impacket without touching the disk.

Python 59 7 Updated Mar 15, 2026

Siege is an http load tester and benchmarking utility

C 6,190 397 Updated Feb 11, 2026
C 174 27 Updated Mar 15, 2026

Bof of RegPwn by MDSec

C 93 7 Updated Mar 15, 2026

KslDump — Why bring your own knife when Defender already left one in the kitchen?

Python 255 27 Updated Mar 17, 2026

Extract Windows credentials directly from VM memory snapshots and virtual disks

Rust 751 62 Updated Mar 24, 2026

Monitor the Windows Event Log with grep-like features or filtering for specific Event IDs

Python 85 4 Updated Mar 17, 2026

Active Directory information dumper via ADWS for evasion purposes.

Python 208 12 Updated Feb 23, 2026

Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registries.

Go 39 2 Updated Mar 24, 2026

Bring your own Unwind Data Framework

C++ 105 12 Updated Mar 15, 2026

A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and static signature removal.

C 170 29 Updated Mar 15, 2026

Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑trust mode. Instead of relying on file‑based approach, it us…

ASP.NET 89 17 Updated Mar 10, 2026

Lnk crafting and research tools

C# 149 8 Updated Mar 4, 2026

C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automation.

C 277 29 Updated Mar 23, 2026

Printer exploitation framework for penetration testing. Discovers printers via PJL scanning, checks for default credentials, and extracts stored credentials through pass-back attacks and protocol-l…

Go 18 Updated Mar 10, 2026

Proof-of-Concept tool to dump trusted domain objects

Python 28 3 Updated Mar 10, 2026

Tools to bypass flawed SELinux policies using the init_module system call

C 59 10 Updated Nov 20, 2023

Kerberos CNAME abuse PoC

Python 86 13 Updated Jan 27, 2026

A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.

PowerShell 432 45 Updated Mar 17, 2026

The Azure Execution Tool

PowerShell 140 13 Updated Feb 6, 2026

OBLITERATE THE CHAINS THAT BIND YOU

Python 3,341 603 Updated Mar 8, 2026

A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.

C# 786 128 Updated Mar 19, 2026

ASPX Web Shell with COFF Loader

ASP.NET 124 19 Updated Mar 10, 2026

Notion C2 Profile for Mythic

Python 41 1 Updated Mar 3, 2026

Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.

C# 231 24 Updated Mar 13, 2026

PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.

C 62 16 Updated Feb 27, 2026
Next