-
root IT-SECURITY
- https://arthurminasyan.com
- @B0lg0r0v
Block or Report
Block or report B0lg0r0v
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLists (3)
Sort Name ascending (A-Z)
Stars
Language
Sort by: Recently starred
Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader
🛡️ Make your web services secure by default !
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
A cheat sheet that contains advanced queries for SQL Injection of all types.
Compiled Binaries for Ghostpack (.NET v4.0)
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
Slides & Code snippets for a workshop held @ x33fcon 2024
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by…
XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.
Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments
A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
Tool to audit and attack LAPS environments
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
A post exploitation framework designed to operate covertly on heavily monitored environments
Patch Linux executables for compatibility with older glibc