PE Packer/Crypter Source
Packer/crypter source code for PE executables. Encrypts the .text section, adds decryption stub, modifies entry point.
Professional offensive security tools & exploit frameworks
Packer/crypter source code for PE executables. Encrypts the .text section, adds decryption stub, modifies entry point.
PowerShell loader that downloads and executes payload in memory without writing to disk. AMSI bypass included.
Python/C library for C2 communication over HTTP/S, DNS, and ICMP. Custom protocol with encryption and steganography.
10 Windows persistence techniques implemented in code: Registry, Scheduled Tasks, WMI Events, COM Hijack, DLL Search Order, and more.
Malleable C2 profile generator for Cobalt Strike and Sliver. Produces profiles that mimic legitimate CDN, cloud service, and popular app traffic.
Standalone SOCKS5 pivoting module in C. Static binary under 100KB that creates a SOCKS5 proxy on the compromised host for pivoting into internal networks.
C/C++ library with 8 Windows process injection techniques: Classic DLL, Process Hollowing, APC Queue, Syscall-based, and more.
Bash/Terraform script that deploys complete phishing infrastructure: GoPhish + Evilginx2 + categorized domain + SSL certificates.
Pack of 15 Beacon Object Files (BOFs) for Cobalt Strike: enumeration, credential access, lateral movement, and defense evasion.
Pure PowerShell script (no external modules) for complete Active Directory enumeration: users, groups, GPOs, ACLs, trusts, SPNs.
Python script that performs Kerberoasting against Active Directory: requests TGS tickets for SPN-enabled accounts and exports hashes for offline cracking.
Custom .NET C2 agent generator: HTTP/HTTPS/SMB stagers with obfuscation, in-memory compilation, and AMSI evasion.