Skip to content
You must be logged in to sponsor mgeeky

Become a sponsor to Mariusz Banach

Hi! I'm Mariusz, an Offensive Security afficionado. Been solving IT Security problems from both defensive and offensive sides of the barricade for more than 14 years by now out of which seven profesionally. I was always more attracted to sharing knowledge through my code, tools, scripts, exploits rather than writing blog posts.

This Github account acts as my way to say thank you to the community from which I've taken & learned so much. The natural move for me was to give back to the community by releasing lots of my projects, gists, tools and contribute to plenty other open-source projects in hope to bring better quality. That costed me countless hours, sleepless nights.

🔥 I'm really working hard to push our Offensive Security industry steps further and enjoy seeing how defensive community is picking up on our tactics by implementing novel defensive countermeasures. That's a really great evolution to what we Offensive Engineers contribute to indirectly.

☕ If you ever benefited from my projects, tools, scripts, pull requests - if you ever saw my work helpful to others, it would be really awesome if you could consider supporting these efforts through my Github Sponsors page. Simply buying me a coffee or better a beer - would keep way more motivated!

🦠 Sponsors will receive an exclusive access to my private repositories grouped in Binary-Offensive.com organization where I share decent quality Offensive Security Tooling (OST). There are a few exclusive toolkits worth taking a look, be sure of that!

Some of my private repositories shared with my Sponsors include:

  • MSISnatcher - MSI backdooring companion
  • Polonium - AV/EDR benchmarking tool, advanced shellcode loader
  • Bloated-EXE-in-LNK
  • SharpPRT - PRT extraction helper
  • cobalt-initial-opsec - headless agressor script
  • BOF.NET - (my fork) stealthily run .NET assemblies in-process
  • Carbuncle - (my fork) All you ever wanted from Outlook during RT
  • azure-functions-redirector
  • digitalocean-app-redirector
  • MyStayKit
  • Anonymize_CS_Logs
  • mgeeky-gists
  • and more..

Kind regards,
Mariusz Banach.

Thanks for your time and consideration! 😊

@mgeeky

2 ** 6 + 2 ** 4 = number of sponsors I now dream for! :-)

Current sponsors 46

Private Sponsor
@fashionproof
@1angly
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
@natesubra
@0xSV1
Private Sponsor
Private Sponsor
Private Sponsor
@patrickm500
Private Sponsor
@000-JJ-000
Private Sponsor
@theart42
@cirosec
Private Sponsor
Private Sponsor
@nmht3t
@saulg00dmin
@Fr0gZero
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
@isuckatscript1ng
Private Sponsor
Private Sponsor
Private Sponsor
@spetsnaz7
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
@BaddKharma
@0r3ak
@Maleick
Private Sponsor
@Reyniel
@dmay3r
@benfinke
Private Sponsor
@sl4cky
Past sponsors 182
@l4ckyguy
@thegeekdiver
Private Sponsor
Private Sponsor
@RedTeams
@ep1nephrine
@C0axx
Private Sponsor
@JamesIT
Private Sponsor
@Barriuso
@scaery
Private Sponsor
Private Sponsor
@Art-Fakt
Private Sponsor
Private Sponsor
@ChrisTruncer

Featured work

  1. mgeeky/Penetration-Testing-Tools

    A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.

    PowerShell 2,618
  2. mgeeky/cobalt-arsenal

    My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+

    PowerShell 1,051
  3. mgeeky/ThreadStackSpoofer

    Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.

    C++ 1,061
  4. mgeeky/RedWarden

    Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation

    Python 935
  5. mgeeky/ShellcodeFluctuation

    An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents

    C++ 961
  6. mgeeky/PackMyPayload

    A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX

    Python 880

57% towards 80 monthly sponsors goal

@fashionproof @Maleick
@1angly @natesubra @0xSV1 @Reyniel @sl4cky

fashionproof and 45 others sponsor this goal

Select a tier

$ a month

You'll receive any rewards listed in the $20 monthly tier. Additionally, a Public Sponsor achievement will be added to your profile.

$10 a month

Select

The Observer

  • Get a Sponsor badge on your profile
  • Express your gratitude for the community sharing idea I'm cultivating
  • Give me a nudge to keep working harder while participating in a global cyber-resilience improvement effort

$20 a month

Select

The Supporter

You use my software and want to get access to my over 12+ private, sponsorware Offensive Security Tooling (OST) - exclusively available to sponsors, who just like yourself are InfoSec Professionals.

Perks:

  • Access to my Sponsorware Github organisation bringing 12+ repositories
    • polonium - AV/EDR benchmarking utility equipped with a fair share of evasion tactics
    • improved BOF.NET - in-process .NET execution, say good bye to fork & run execute-assembly
    • improved Carbuncle - complete Outlook dominance via COM interop
    • smuggler - your one-and-only HTML Smuggling companion
    • and a few others!

$40 a month

Select

The Generous Supporter

You use my software a lot - perhaps you're a fan of the idea I cultivate - and want to support my Open Source work, but $20 feels too low for the value you're getting out of it.

Perks:

  • Access to my Sponsorware Github organisation bringing 12+ repositories
    • polonium - AV/EDR benchmarking utility equipped with a fair share of evasion tactics
    • improved BOF.NET - in-process .NET execution, say good bye to fork & run execute-assembly
    • improved Carbuncle - complete Outlook dominance via COM interop
    • smuggler - your one-and-only HTML Smuggling companion
    • and a few others!
  • Have your bug reports prioritized

$100 a month

Select

The Organization

Recommended for commercial use

Your organization uses my Offensive Security Tools (OST) for its engagements and wants to make sure that my software is well-maintained, stable and safe to use for the years to come. You agree that $100 a month (less than 1 hour of a skilled Penetration Tester / Security Consultant) is a rightous investment into a passionate offensive developer solving tons of security testing problems during his off hours.

Perks:

  • Access to my Sponsorware Github organisation bringing 12+ repositories
  • Have your bug reports prioritized
  • Optional: link + logo in a choosen repository's README