Skip to content
View 28Zaaky's full-sized avatar

Block or report 28Zaaky

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. PHANTOM-ROOTKIT PHANTOM-ROOTKIT Public

    Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/AV evasion.

    C++ 35 4

  2. KHAOS-LOADER KHAOS-LOADER Public

    Advanced shellcode loader with AES-256, EDR/AMSI/ETW bypass, indirect syscalls, evasion, early-bird APC injection and PPID spoofing.

    C 29 9

  3. Stealth-Keylogger Stealth-Keylogger Public

    Stealth Windows keylogger.

    C++ 5 2

  4. PULSE-C2 PULSE-C2 Public

    HTTPS C&C Framework with encrypted beacons, web dashboard, and Windows agent.

    Python 50 17

  5. LPE-EXPLOIT LPE-EXPLOIT Public

    From USER to NT AUTHORITY with UAC Bypass and Primary Token stealing.

    C 5 3

  6. SHELLCRYPT SHELLCRYPT Public

    AES-256-CBC shellcode encryption tool for Windows.

    C 2 1