Giter Site home page Giter Site logo

Hi there 👋

  • 🔭 I'm unclear what role I am, but I am currently working in Adversary Operations, and tooling
  • 🌱 I’m currently learning about cyber espionage operations
  • 👯 I’m looking to collaborate on challenging projects
  • 📫 How to summon me: @blackleitus or @skybulk on every channel

🤔 Projects:

SkyBulk's Projects

4-zero-3 icon 4-zero-3

403/401 Bypass Methods + Bash Automation + Your Support ;)

a-red-teamer-diaries icon a-red-teamer-diaries

RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.

abdullah-agency icon abdullah-agency

Abdullah Agency is a sleek and engaging multi-page agency website template, skillfully crafted using Next.js, Tailwind CSS, and Framer Motion by the talented Tailwind CSS team. With its minimalist aesthetic and captivating animations, it's perfect for modern agencies.

aboutsecurity icon aboutsecurity

用于渗透测试和红队基础设施建设的 payload 和 bypass 字典。A list of payload and bypass lists for penetration and red team infrastructure build.

adama icon adama

Searches For Threat Hunting and Security Analytics

admin2sys icon admin2sys

Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM

aep icon aep

Adversary Emulation Planner

al-khaser icon al-khaser

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

alae icon alae

[CVPR2020] Adversarial Latent Autoencoders

alaris icon alaris

A protective and Low Level Shellcode Loader that defeats modern EDR systems.

andrewspecial icon andrewspecial

AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.

anti-virus-evading-payloads icon anti-virus-evading-payloads

During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.