-
Binary-Offensive.com
- Poland
- https://binary-offensive.com
- @mariuszbit
Sponsors
Highlights
-
ProtectMyTooling Public
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it wiโฆ
-
The-Hacker-Recipes Public
Forked from The-Hacker-Recipes/The-Hacker-RecipesThis project is aimed at freely providing technical guides on various hacking topics.
-
cuddlephish Public
Forked from fkasler/cuddlephishWeaponized Browser-in-the-Middle (BitM) for Penetration Testers
HTML MIT License UpdatedMay 6, 2025 -
decode-spam-headers Public
A script that helps you understand why your E-Mail ended up in Spam
-
PackMyPayload Public
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
-
tomcatWarDeployer Public
Apache Tomcat auto WAR deployment & pwning penetration testing tool.
-
digitalocean-app-redirector Public
Reverse-HTTP Redirector via DigitalOcean Apps Platform
-
ElusiveMice Public
Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
-
Penetration-Testing-Tools Public
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
-
SharpWebServer Public
Red Team oriented C# Simple HTTP & WebDAV Server with Net-NTLM hashes capture functionality
-
msidump Public
MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.
-
cobalt-arsenal Public
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
-
sleep_python_bridge Public
Forked from Cobalt-Strike/sleep_python_bridgeThis project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python without the need for for the standard GUI client. NOTE: This projeโฆ
-
-
PE-library Public
Lightweight Portable Executable parsing library and a demo peParser application.
-
msi-shenanigans Public
Proof of Concept code and samples presenting emerging threat of MSI installer files.
-
-
RedWarden Public
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
-
expdevBadChars Public
Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
-
Havoc Public
Forked from HavocFramework/HavocThe Havoc Framework
-
CS-Remote-OPs-BOF Public
Forked from trustedsec/CS-Remote-OPs-BOF -
Stracciatella Public
OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup
-
Exploit-Development-Tools Public
A bunch of my exploit development helper tools, collected in one place.
-
PowerUpSQL Public
Forked from NetSPI/PowerUpSQLPowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
-
CustomXMLPart Public
A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.
-
DeathSleep Public
Forked from janoglezcampos/DeathSleepA PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.
-
UnhookMe Public
UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware
-
AzureRT Public
AzureRT - A Powershell module implementing various Azure Red Team tactics
-
ShellcodeFluctuation Public
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
-
ThreadStackSpoofer Public
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.




