Skip to content
Avatar
💭
Offensive Sencha Consultant
💭
Offensive Sencha Consultant

Sponsors

@a7t0fwa7 @ep1nephrine

Achievements

Achievements

Block or Report

Block or report mgeeky

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mgeeky/README.md

mgeeky's code lair

LinkedIn Twitter GitHub

Hi! I'm Mariusz, an Offensive Security afficionado. Been solving IT Security problems from both defensive and offensive sides of the barricade for more than 14 years by now out of which seven profesionally. I was always more attracted to sharing knowledge through my code, tools, scripts, exploits rather than writing blog posts. With that on the table, this Github account acts as my legacy. 😄

🎓 My area of expertise is Windows & Networks security assessments. Started as a Malware Analyst, pushed my career through all sorts of technical roles & challenges to land myself in Red Team operator's shoes evaluating holistically my Customer's cyber-defensive programmes.

I'm a holder of following cybersecurity/IT certificates: CRTE, CRTP, eCPTX, CCNA, CREST CRT, OSCP, OSCE, OSWP .

Welcome to my Github lair where you'll find all sorts of security-related tools of hopefully decent quality.

❤️ If you ever benefited from my projects, tools, scripts, pull requests - if you ever saw my work helpful to others, it would be really awesome if you could consider supporting these efforts through my Github Sponsors page. You'll receive an exclusive access to my private repositories containing a few other high quality tools and utilities greatly improving Red Teams delivery. Show some love and support - consider buying me a coffee or better a beer - as a way of saying thank you! 💪

Cheers!

mgeeky's GitHub Stats

Pinned

  1. A collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at lea…

    PowerShell 803 182

  2. My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+

    PowerShell 421 78

  3. Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation

    Python 412 65

  4. Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.

    C++ 304 44

  5. Apache Tomcat auto WAR deployment & pwning penetration testing tool.

    Python 314 118

  6. OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup

    C# 254 37

705 contributions in the last year

Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Mon Wed Fri
Activity overview