Skip to content
Avatar
šŸ’­
Wanna sip a sencha?
šŸ’­
Wanna sip a sencha?

Sponsors

@fashionproof @JamesIT @RedTeams @ep1nephrine @C0axx @Art-Fakt @Barriuso @josephkingstone @ASkyeye
Block or Report

Block or report mgeeky

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mgeeky/README.md

mgeeky's code lair

Blog LinkedIn Twitter GitHub

Hi! I'm Mariusz, an Offensive Security afficionado. Been solving IT Security problems from both defensive and offensive sides of the barricade for more than 14 years by now out of which eight profesionally. I was always more attracted to sharing knowledge through my code, tools, scripts, exploits rather than writing blog posts. With that on the table, this Github account acts as my legacy. šŸ˜„

šŸŽ“ My area of expertise is Windows & Networks security assessments. Started as a Malware Analyst, pushed my career through all sorts of technical roles & challenges to land myself in Red Team operator's shoes evaluating holistically my Customer's cyber-defensive programmes.

I'm a holder of following cybersecurity/IT certificates: CARTP, CRTE, CRTP, eCPTX, CCNA, CREST CRT, OSCP, OSCE, OSWP .

⚔ Welcome to my Github lair where you'll find all sorts of security-related tools of hopefully decent quality.

ā¤ļø If you ever benefited from my projects, tools, scripts, pull requests - if you ever saw my work helpful to others, it would be really awesome if you could consider supporting these efforts through my Github Sponsors page. You'll receive an exclusive access to my private repositories containing a few other high quality tools and utilities greatly improving Red Teams delivery. Show some love and support - consider buying me a coffee or better a beer - as a way of saying thank you! šŸ’Ŗ

Cheers!

mgeeky's GitHub Stats

Pinned

  1. A collection of more than 170+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at lea…

    PowerShell 1.5k 326

  2. My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+

    PowerShell 674 112

  3. Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.

    C++ 663 117

  4. RedWarden Public

    Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation

    Python 597 107

  5. An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents

    C++ 535 104

  6. Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it wi…

    PowerShell 271 24

997 contributions in the last year

Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul Mon Wed Fri

Contribution activity

Seeing something unexpected? Take a look at the GitHub profile guide.