Skip to content
View reveng007's full-sized avatar
💩
Trying to code!
💩
Trying to code!

Block or report reveng007

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+SID), PKINIT authentication, and NT hash extraction via UnPAC…

C 107 19 Updated Dec 21, 2025

C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.

Python 1,094 176 Updated Jun 25, 2024

A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls

Python 451 87 Updated Sep 9, 2022

PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.

Python 873 236 Updated Dec 28, 2025

AppLocker-Based EDR Neutralization

C 240 31 Updated Dec 19, 2025

Adversary tradecraft detection, protection, and hunting

Go 2,423 203 Updated Jan 4, 2026

A collection of intel and usernames scraped from various cybercrime sources & forums. DarkForums, HackForums, Patched, Cracked, BreachForums, LeakBase, & more

125 21 Updated Jan 4, 2026

Splunk Boss of the SOC version 3 dataset.

399 62 Updated Jun 18, 2020

Azure Sentinel KQL

467 118 Updated Jul 28, 2025

Code included as part of the MustLearnKQL blog series

1,129 191 Updated Oct 6, 2025

Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan in-memory .NET assembly loads. This tool unhooks that functi…

C++ 194 23 Updated Dec 8, 2025

Update funcap to be able to run in ida 9.1

Python 2 1 Updated Dec 3, 2025

Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and storing them inside images or videos. A lightweight loader …

C++ 95 22 Updated Nov 22, 2025

Windows Driver designed to validate the integrity of User-Mode call stacks from Ring 0 (AMD IBS / Instruction Based Sampling)

C 9 Updated Nov 30, 2025

Miscellaneous stuff I create

Python 43 7 Updated Dec 26, 2025

Generate backdoored RSA keys using SETUP

Go 226 19 Updated Dec 1, 2025

UAC Bypass using UIAccess program QuickAssist

C 203 23 Updated Nov 30, 2025

Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopeful…

PowerShell 154 13 Updated Nov 23, 2025

How to Zeek Sysmon Logs!

Zeek 103 18 Updated Feb 12, 2022

JA4+ is a suite of network fingerprinting standards

Rust 1,705 151 Updated Dec 31, 2025

Windows User-Mode Shellcode Development Framework (WUMSDF)

C++ 120 17 Updated Nov 17, 2025

A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, inspect, and analyze AWS infrastructure for security issues an…

Python 78 16 Updated Jul 25, 2025

Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence

Python 413 72 Updated Nov 7, 2025

Damn Vulnerable CICS Application

Python 29 7 Updated Mar 2, 2024

UAC bypass, Elevate, Persistence methods

Python 2,730 391 Updated Feb 13, 2023

AWS MCP Proxy Server

Python 219 26 Updated Dec 22, 2025

Collection of Cyber Threat Intelligence sources from the deep and dark web

6,441 1,090 Updated Jan 4, 2026

Bypass YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.

Python 52 9 Updated Oct 2, 2025

Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, customizable alerts, and a dashboard with analytics. API-read…

Python 16 3 Updated Jun 11, 2024

Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privilege escalation.

HTML 62 12 Updated May 3, 2024
Next