+
Skip to content
View Paradoxis's full-sized avatar
:shipit:
Security Person
:shipit:
Security Person

Block or report Paradoxis

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

A list of public attacks on BitLocker

358 22 Updated Aug 9, 2025

Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools

Python 271 18 Updated Sep 18, 2025

This is the tool to dump the LSASS process on modern Windows 11

C++ 445 54 Updated Sep 15, 2025

LD_PRELOAD library to bypass TLS certificate verification for debugging and testing

C 88 9 Updated Sep 24, 2025

open source process monitor

C 293 77 Updated Apr 25, 2025

Binary Exploitation Phrack CTF Challenge

C 65 13 Updated Aug 21, 2025

BOF for Kerberos abuse (an implementation of some important features of the Rubeus).

C 499 57 Updated Mar 29, 2025

Request device ticket/token using the device's MSA

C# 31 5 Updated Aug 25, 2025

COFF file (BOF) for managing Kerberos tickets.

C 310 32 Updated Jul 2, 2023

NTP Exfiltration Tool

Go 146 14 Updated Nov 14, 2023

A Python library for the Philips Hue system

Python 1,553 268 Updated Oct 2, 2024

An offensive toolkit for restless guests #DEFCON33

Python 52 2 Updated Aug 11, 2025

A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.

PowerShell 609 67 Updated Oct 9, 2025

A set of fully-undetectable process injection techniques abusing Windows Thread Pools

C++ 1,186 162 Updated Dec 11, 2023

SCEP request tool for AD CS and Intune

Python 69 2 Updated Jul 31, 2025

An ADCS honeypot to catch attackers in your internal network.

Jinja 14 1 Updated Jun 27, 2024

Seamless remote browser session control

TypeScript 212 17 Updated Jul 8, 2025

💾 Self-hosted online file converter. Supports 1000+ formats ⚙️

TypeScript 8,629 403 Updated Oct 7, 2025

A tool for coercing and relaying Kerberos authentication over DCOM and RPC.

Python 137 16 Updated Jul 17, 2025

Permanently disable EDRs as local admin

PowerShell 118 13 Updated Oct 7, 2025
HCL 2 1 Updated Mar 29, 2023

Automating the MITM attack on WSUS

Python 271 30 Updated Oct 9, 2025

A simple Impacket-based tool to check a set of credentials against many Windows hosts and get permission for SMB shares.

Python 13 2 Updated Jul 30, 2025

(Sometimes partial) Python re-implementations of the technologies involved in reading various data sources in Chrome-esque applications.

Python 193 41 Updated May 23, 2025

The LevelDB key-value database in the Go programming language.

Go 1,153 143 Updated Jan 7, 2017
Python 112 8 Updated Oct 15, 2025

64-bit, position-independent implant template for Windows in Rust.

Rust 144 23 Updated Apr 26, 2025

Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)

Rust 352 47 Updated Mar 2, 2024

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

C 3,101 811 Updated Sep 3, 2022
Next
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载