Skip to content
View maikxchd's full-sized avatar

Block or report maikxchd

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

Security

23 repositories

Ultimate DevSecOps library

5,911 1,040 Updated Nov 21, 2024

🛡️ Awesome Cloud Security Resources ⚔️

2,129 324 Updated Nov 8, 2024

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

5,901 1,243 Updated Oct 4, 2024

Monitoring and controlling kernel API calls with stealth hook using EPT

C++ 1,212 332 Updated Jan 22, 2022
C 67 23 Updated Dec 17, 2020

PatchGuard Research

C++ 295 113 Updated Oct 6, 2018

ETW patches from userMode learned till now

C++ 10 3 Updated Aug 13, 2023

Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…

Python 3,916 624 Updated Jan 19, 2025

A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.

JavaScript 254 26 Updated May 10, 2024

Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.

2,063 279 Updated Feb 24, 2023

Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-CradleCrafter/Invoke-DOSfuscation payloads

Batchfile 296 81 Updated Oct 21, 2021

This script is designed to test the detection and response capabilities of endpoint detection and response (EDR) solutions.

C 4 Updated Feb 11, 2023

PoC module to demonstrate automated lateral movement with the Havoc C2 framework.

C++ 287 34 Updated Dec 9, 2023

Exploit MsIo vulnerable driver

C++ 92 36 Updated Aug 12, 2021

A memory-based evasion technique which makes shellcode invisible from process start to end.

C 1,167 141 Updated Oct 16, 2023

Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine

Shell 429 78 Updated Feb 11, 2025

Driver loader for bypassing Windows x64 Driver Signature Enforcement

C 1,096 336 Updated Aug 1, 2019

IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.

Python 95 11 Updated Jan 17, 2024

A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.

C 333 39 Updated Feb 10, 2025

Execute shellcode files with rundll32

C++ 190 23 Updated Jan 28, 2024

PoCs and tools for investigation of Windows process execution techniques

C# 891 141 Updated Nov 20, 2024

A tool that is used to hunt vulnerabilities in x64 WDM drivers

Python 173 24 Updated Jan 5, 2024