Skip to content
View mgeeky's full-sized avatar
๐Ÿ’ญ
Wanna sip a sencha?
๐Ÿ’ญ
Wanna sip a sencha?
  • Binary-Offensive.com
  • Poland
  • X @mariuszbit

Sponsors

@fashionproof
@C0axx
Private Sponsor
@1angly
Private Sponsor
@hashtaginfosec
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
@AnubisSec
Block or Report

Block or report mgeeky

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
mgeeky/README.md

mgeeky's code lair

Blog LinkedIn Twitter GitHub Website

Hi! I'm Mariusz, an Offensive Security afficionado. Been solving IT Security problems from both defensive and offensive sides of the barricade for more than 14 years by now out of which eight profesionally. I was always more attracted to sharing knowledge through my code, tools, scripts, exploits rather than writing blog posts. With that on the table, this Github account acts as my legacy. ๐Ÿ˜„

๐ŸŽ“ My area of expertise is Windows & Networks security assessments. Started as a Malware Analyst, pushed my career through all sorts of technical roles & challenges to land myself in Red Team operator's shoes evaluating holistically my Customer's cyber-defensive programmes.

I'm a holder of following cybersecurity/IT certificates: CARTP, CRTE, CRTP, eCPTX, CCNA, CREST CRT, OSCP, OSCE, OSWP .

โšก Welcome to my Github lair where you'll find all sorts of security-related tools of hopefully decent quality.

โค๏ธ If you ever benefited from my projects, tools, scripts, pull requests - if you ever saw my work helpful to others, it would be really awesome if you could consider supporting these efforts through my Github Sponsors page. You'll receive an exclusive access to my private repositories containing a few other high quality tools and utilities greatly improving Red Teams delivery. Show some love and support - consider buying me a coffee or better a beer - as a way of saying thank you! ๐Ÿ’ช

Cheers!

mgeeky's GitHub Stats

Pinned

  1. Penetration-Testing-Tools Penetration-Testing-Tools Public

    A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.

    PowerShell 2.4k 476

  2. cobalt-arsenal cobalt-arsenal Public

    My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+

    PowerShell 982 144

  3. ThreadStackSpoofer ThreadStackSpoofer Public

    Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.

    C++ 945 169

  4. RedWarden RedWarden Public

    Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation

    Python 865 136

  5. ShellcodeFluctuation ShellcodeFluctuation Public

    An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents

    C++ 850 147

  6. PackMyPayload PackMyPayload Public

    A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX

    Python 797 128