Skip to content
View dmore's full-sized avatar
💭
Available for full time roles
💭
Available for full time roles

Block or report dmore

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. darkflare-red-wraps-tcp-traffic-as-https-stealth darkflare-red-wraps-tcp-traffic-as-https-stealth Public

    Forked from doxx/darkflare

    DarkFlare Firewall Piercing (TCP over CDN)

    Go 1

  2. DEDSEC_BOTNET_red_stealth_advanced_payloads-python DEDSEC_BOTNET_red_stealth_advanced_payloads-python Public

    Forked from 0xbitx/DEDSEC_BOTNET

    Linux-based botnet builder designed for creating advanced botnet payloads.

  3. ntpescape-red-stealth-exfil-slow ntpescape-red-stealth-exfil-slow Public

    Forked from evallen/ntpescape

    NTP Exfiltration Tool Hard to detect

    Go

  4. PoolParty-red-process-injection-stealth PoolParty-red-process-injection-stealth Public

    Forked from SafeBreach-Labs/PoolParty

    A set of fully-undetectable process injection techniques abusing Windows Thread Pools

    C++

  5. SuperMega-Red-shellcode-inject-stealth SuperMega-Red-shellcode-inject-stealth Public

    Forked from dobin/SuperMega

    Stealthily inject shellcode into an executable

    Python

  6. nysm-red-eBPF-offensive-post-exploit-container-stealth-under-sa-vis nysm-red-eBPF-offensive-post-exploit-container-stealth-under-sa-vis Public

    Forked from eeriedusk/nysm

    nysm is a stealth post-exploitation container.

    C