![chatgpt-api logo](https://raw.githubusercontent.com/github/explore/ea47449629d663f4ca24763890b9b8b395069d3b/topics/chatgpt-api/chatgpt-api.png)
Block or Report
Block or report BYT3W1Z4RD
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLanguage
Sort by: Recently starred
Starred repositories
Windows bootx64.efi decompiled files repo © Microsoft Corporation. All rights reserved
C# HWID Changer 🔑︎ Disk, Guid, Mac, Gpu, Pc-Name, Win-ID, EFI, SMBIOS Spoofing [Usermode]
Code that overwrites the Windows MBR with a custom bootloader!
A C# uploader for the TinySafeBoot bootloader for AVR.
A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into Normal Mode.
Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution
Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) PhantomThread (An evolved callstack-masking implementation)
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.
Defense Evasion Techniques Repository. This repository contains a collection of techniques designed to bypass Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) systems.
Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments
Writing custom backdoor payloads with C# - Defcon 27 Workshop
A script to automate keystrokes through a graphical desktop program.
Rewrite to fit my needs
Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection
A powershell module for hiding payloads in the pixels of images
Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver