Skip to content
View mgeeky's full-sized avatar
💭
Wanna sip a sencha?
💭
Wanna sip a sencha?
  • Binary-Offensive.com
  • Poland
  • X @mariuszbit

Sponsors

Private Sponsor
@fashionproof
@1angly
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
@natesubra
@0xSV1
Private Sponsor
Private Sponsor
Private Sponsor
@patrickm500

Sponsoring

@secretsquirrel

Block or report mgeeky

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mgeeky/README.md

mgeeky's code lair

Blog LinkedIn Twitter GitHub Website

Hi! I'm Mariusz, an Offensive Security afficionado. Been solving IT Security problems from both defensive and offensive sides of the barricade for more than 14 years by now out of which eight profesionally. I was always more attracted to sharing knowledge through my code, tools, scripts, exploits rather than writing blog posts. With that on the table, this Github account acts as my legacy. 😄

🎓 My area of expertise is Windows & Networks security assessments. Started as a Malware Analyst, pushed my career through all sorts of technical roles & challenges to land myself in Red Team operator's shoes evaluating holistically my Customer's cyber-defensive programmes.

I'm a holder of following cybersecurity/IT certificates: CARTP, CRTE, CRTP, eCPTX, CCNA, CREST CRT, OSCP, OSCE, OSWP .

⚡ Welcome to my Github lair where you'll find all sorts of security-related tools of hopefully decent quality.

❤️ If you ever benefited from my projects, tools, scripts, pull requests - if you ever saw my work helpful to others, it would be really awesome if you could consider supporting these efforts through my Github Sponsors page. You'll receive an exclusive access to my private repositories containing a few other high quality tools and utilities greatly improving Red Teams delivery. Show some love and support - consider buying me a coffee or better a beer - as a way of saying thank you! 💪

Cheers!

mgeeky's GitHub Stats

Pinned Loading

  1. Penetration-Testing-Tools Penetration-Testing-Tools Public

    A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.

    PowerShell 2.6k 510

  2. ThreadStackSpoofer ThreadStackSpoofer Public

    Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.

    C++ 1.1k 177

  3. cobalt-arsenal cobalt-arsenal Public

    My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+

    PowerShell 1.1k 153

  4. RedWarden RedWarden Public

    Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation

    Python 935 143

  5. ProtectMyTooling ProtectMyTooling Public

    Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it wi…

    PowerShell 900 134

  6. PackMyPayload PackMyPayload Public

    A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX

    Python 880 138