Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
@mgeeky
mgeeky
Follow
View mgeeky's full-sized avatar
💭
Wanna sip a sencha?

Mariusz Banach mgeeky

💭
Wanna sip a sencha?
🔴 Red Team operator. 👾 I live & breath Windows malware. 🛡️ Securing the world by stealing cyber criminals' operation theater and exposing it through code
  • Binary-Offensive.com
  • Poland
  • X@mariuszbit

Sponsors

Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
@natesubra
Private Sponsor
Private Sponsor
Private Sponsor
@theart42
@timothytrillion
@django-88
Private Sponsor

Block or report mgeeky

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more aboutblocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more aboutreporting abuse.

Report abuse
mgeeky/README.md

BlogLinkedInTwitterGitHubWebsite

Hi! I'm Mariusz, an Offensive Security afficionado. Been solving IT Security problems from both defensive and offensive sides of the barricade for more than 14 years by now out of which eight profesionally. I was always more attracted to sharing knowledge through my code, tools, scripts, exploits rather than writing blog posts. With that on the table, this Github account acts as my legacy. 😄

🎓 My area of expertise is Windows & Networks security assessments. Started as a Malware Analyst, pushed my career through all sorts of technical roles & challenges to land myself in Red Team operator's shoes evaluating holistically my Customer's cyber-defensive programmes.

I'm a holder of following cybersecurity/IT certificates:CARTP, CRTE, CRTP, eCPTX, CCNA, CREST CRT, OSCP, OSCE, OSWP .

⚡ Welcome to my Github lair where you'll find all sorts of security-related tools of hopefully decent quality.

❤️ If you ever benefited from my projects, tools, scripts, pull requests - if you ever saw my work helpful to others, it would be really awesome if you could consider supporting these efforts throughmy Github Sponsors page. You'll receive an exclusive access to my private repositories containing a few other high quality tools and utilities greatly improving Red Teams delivery. Show some love and support - consider buying me a coffee or better a beer - as a way of saying thank you! 💪

Cheers!

mgeeky's GitHub Stats

PinnedLoading

  1. Penetration-Testing-ToolsPenetration-Testing-ToolsPublic

    A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.

    PowerShell 2.9k 542

  2. ThreadStackSpooferThreadStackSpooferPublic

    Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.

    C++ 1.2k 192

  3. cobalt-arsenalcobalt-arsenalPublic

    My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+

    PowerShell 1.1k 159

  4. ProtectMyToolingProtectMyToolingPublic

    Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it wi…

    PowerShell 1k 144

  5. PackMyPayloadPackMyPayloadPublic

    A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX

    Python 1.1k 164

  6. decode-spam-headersdecode-spam-headersPublic

    A script that helps you understand why your E-Mail ended up in Spam

    Python 663 97


[8]ページ先頭

©2009-2025 Movatter.jp