Pinned Repositories
Attacker_Infrastructure_Setup
BSQLi-2.0
reverse engineered and improved BSQLi script from Coffinxp
CaveCarver
CaveCarver - PE backdooring tool which utilizes and automates code cave technique
DllDragon
A simple to use single-include Windows API resolver
FileExtractor
C++ Code to Extract Windows File and Receive in Linux Machine
Pandora-Hvnc-Hidden-Browser-Real-Vnc-Working-Chromium-Edge-Opera-Gx
Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidden Startup Hidden Applications
PrivilegeEscalationClass
C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin
RemoveNATfromWSL
Bridge your WSL instance onto to your network
SymProcSleuth
A pure C version of SymProcAddress
Valkyries-Embrace
Valkyrie's Embrace is a tool written in the Odin programming language that allows executing shellcode on a remote system.
a7t0fwa7's Repositories
a7t0fwa7/Amsi-Patch-Updated-2025
How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.
a7t0fwa7/claude-code
claude-code full original source code from source maps
a7t0fwa7/claude-code-source-code-deobfuscation
This is a cleanroom deobfuscation of the official Claude Code npm package.
a7t0fwa7/ComDotNetExploit
A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and reflection techniques for code injection. This PoC showcases bypassing code integrity checks and loading malicious payloads in highly protected processes such as LSASS. Based on research from James Forshaw.
a7t0fwa7/convoC2
C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.
a7t0fwa7/Cpp-ExecAssembly
C++ Reflective Assembly Loader
a7t0fwa7/CVE-2025-21298
Proof of concept & details for CVE-2025-21298
a7t0fwa7/DataPtrHookWin11
A .data pointer hook with communication in windows 11
a7t0fwa7/junkshell
a7t0fwa7/Microsoft-Activation-Scripts
A Windows and Office activator using HWID / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
a7t0fwa7/Neural-Networks-from-Scratch
Code on how to create an artificial neural network in C++, simply starting from scratch by me(abkarada)
a7t0fwa7/NtCreateUserProcessBOF
An Aggressor Script that utilizes NtCreateUserProcess to run binaries
a7t0fwa7/Nuclei-AI-Prompts
Nuclei-AI-Prompts
a7t0fwa7/ObfusGuard
A C++ header file that obfuscates code to enhance security by preventing reverse engineering and static analysis through control flow manipulation, function wrapping, and more.
a7t0fwa7/open-operator
a7t0fwa7/PPL-0day
Demoting PPL anti-malware services to less than a guest user
a7t0fwa7/Process-Stacking-Injection
a7t0fwa7/SC_DEMO
a7t0fwa7/SecureSethc
Spawn a command prompt as SYSTEM from logon screen while protecting against unauthorized access
a7t0fwa7/ShellGen
Dynamic pointer encryption generator for Windows X64
a7t0fwa7/SkyThought
Sky-T1: Train your own O1 preview model within $450
a7t0fwa7/stride-gpt
An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRIDE methodology.
a7t0fwa7/TheExtendables
a7t0fwa7/umpm
Usermode access to arbitrary physical memory
a7t0fwa7/web-ui
Run AI Agent in your browser.
a7t0fwa7/ZeroProbe
ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It provides a set of enumeration tools to identify security vulnerabilities, analyze system protections, and facilitate exploit development.
a7t0fwa7/L1B3RT4S
TOTALLY HARMLESS LIBERATION PROMPTS FOR GOOD LIL AI'S
a7t0fwa7/OdinLdr
Cobaltstrike Reflective Loader with Synthetic Stackframe
a7t0fwa7/SSH-Stealer
Smart keylogging capability to steal SSH Credentials including password & Private Key
a7t0fwa7/Tutorial-Cursor