salahgeek's repositories
DigiSpark-Scripts
USB Rubber Ducky type scripts written for the DigiSpark.
OSEP-Code-Snippets
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
AlternativeShellcodeExec
Alternative Shellcode Execution Via Callbacks
AMSITrigger
The Hunt for Malicious Strings
binnim
Shitty Nim code that reads in a file and converts it into \x hex representation, for the use of shellcode binaries.
BlackFriday-GPTs-Prompts
List of free GPTs that doesn't require plus subscription
Chimera
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Creating-a-Malicious-doc
Creating a Malicious Macro using MS Word
Empire
Empire is a PowerShell and Python 3.x post-exploitation framework.
Get-ReverseShell
A solution to create obfuscated reverse shells for PowerShell.
HTML-CSS-JavaScript-projects-for-beginners
Learn how to build simple, responsive websites using HTML, CSS, and JavaScript
javascript-dev-bookmarks
A collection of articles that will help you get better at JavaScript.
JavaScript30
30 Day Vanilla JS Challenge
Malicious-LNK-File-Abuse-Hotkey-Feature
Crafting a malicious LNK file with ctrl+c hotkey & execute it everytimes typing ctrl+c hotkey
Nim-Reverse-Shell
A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educational purposes only.
nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
OneShot
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
PowerShell-Reverse-Shell-Generator
Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner
Python-Ethical-Hacking
Python Ethical Hacking, published by Packt
Shhhloader
SysWhispers Shellcode Loader (Work in Progress)
Syscall-Example
Using syscall to load shellcode, Evasion techniques
update_script2
Fileless malware that bypasses Windows Defender using PowerShell and obfuscation