Ecosyste.ms sponsors
An open API service aggregating public data about GitHub Sponsors.
An open API service aggregating public data about GitHub Sponsors.
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code
Funding Links: https://github.com/sponsors/mgeeky
Hi! I'm Mariusz, an Offensive Security afficionado. Been solving IT Security problems from both defensive and offensive sides of the barricade for more than 14 years by now out of which seven profesionally. I was always more attracted to sharing knowledge through my code, tools, scripts, exploits rather than writing blog posts.
This Github account acts as my way to say thank you to the community from which I've taken & learned so much. The natural move for me was to give back to the community by releasing lots of my projects, gists, tools and contribute to plenty other open-source projects in hope to bring better quality. That costed me countless hours, sleepless nights.
🔥 I'm really working hard to push our Offensive Security industry steps further and enjoy seeing how defensive community is picking up on our tactics by implementing novel defensive countermeasures. That's a really great evolution to what we Offensive Engineers contribute to indirectly.
☕ If you ever benefited from my projects, tools, scripts, pull requests - if you ever saw my work helpful to others, it would be really awesome if you could consider supporting these efforts through my Github Sponsors page. Simply buying me a coffee or better a beer - would keep way more motivated!
🦠 Sponsors will receive an exclusive access to my private repositories grouped in Binary-Offensive.com organization where I share decent quality Offensive Security Tooling (OST). There are a few exclusive toolkits worth taking a look, be sure of that!
Some of my private repositories shared with my Sponsors include:
MSISnatcher - MSI backdooring companion
Polonium - AV/EDR benchmarking tool, advanced shellcode loader
Bloated-EXE-in-LNK
SharpPRT - PRT extraction helper
cobalt-initial-opsec - headless agressor script
BOF.NET - (my fork) stealthily run .NET assemblies in-process
Carbuncle - (my fork) All you ever wanted from Outlook during RT
azure-functions-redirector
digitalocean-app-redirector
MyStayKit
Anonymize_CS_Logs
mgeeky-gists
and more..
Kind regards,
Mariusz Banach.
Thanks for your time and consideration! 😊
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
Language: PowerShell - Stars: 2603My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
Language: PowerShell - Stars: 1040Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
Language: C++ - Stars: 1049Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
Language: Python - Stars: 928An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
Language: C++ - Stars: 946A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
Language: Python - Stars: 869