D.Snezhkov (@dsnezhkov)
  • Stars
    star
    1,019
  • Global Rank 29,869 (Top 2 %)
  • Followers 168
  • Following 12
  • Registered over 14 years ago
  • Most used languages
    Go
    25.7 %
    C++
    17.1 %
    Ruby
    14.3 %
    Python
    11.4 %
    JavaScript
    8.6 %
    C#
    8.6 %
    C
    8.6 %
    HTML
    2.9 %
    Java
    2.9 %

Top repositories

1

zombieant

Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
C
197
star
2

SSHoRTy

A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems
Go
123
star
3

deepsea

DeepSea Phishing Gear
Go
113
star
4

typhoon

C#
109
star
5

TruffleSnout

Iterative AD discovery toolkit for offensive operations
C#
82
star
6

racketeer

C#
67
star
7

elfpack

C++
41
star
8

foxtrot

C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox Private Encrypted File Sharing
Python
37
star
9

octohook

Git Web Hook Tunnel for C2
Python
27
star
10

shutter

C++
22
star
11

exclave

C++
15
star
12

RunDllMShim

Run Managed Assemblies with RunDll
C++
14
star
13

HandsFreeCOM

Self-Loading Registration Free COM Functions
C++
11
star
14

cflsh

CloudFlare Worker Shell
Go
11
star
15

h53

A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place
Go
10
star
16

mdns

mdns is a scanner to query services that respond to mDNS, one or many (over 12K). List of services is based on https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml
Go
9
star
17

pufferfish

C
8
star
18

socksdll

Experiments in Go/C bridging and SOCKS5 server
C
8
star
19

USBeacon

Simple auditing beacon framework for USB payloads
Python
7
star
20

redphin

RedPhin - A framework for coding and executing phishing and sec awareness campaigns
Ruby
6
star
21

amoeba

Amoeba: Corporate Subsidiary Search and Intel
Python
6
star
22

LST

A collection of tools created with the goal of overcoming restrictions on data exfiltration and infiltration vectors placed by enterprise captive portals with or without DLP tech, in the form of screen remote sessions, terminal services and kiosks.
JavaScript
6
star
23

webglance

Compact web site screenshot utility based on Chrome Dev Tools Debugging Protocol
Go
4
star
24

coalmine

Coalmine: De-mining canaries in common file formats
Go
4
star
25

nciscoaudit

Nessus Cisco .audit vs static "show [running] config file" reporter
Ruby
3
star
26

burprpt

Rudimentary Burp scanner XML report converter to TXT
Ruby
2
star
27

rcert

Go
2
star
28

caa-twit

CAA record fetch for a domain or a list of domains
Go
1
star
29

codebook

Ruby
1
star
30

xsnake-workflows

Repository of sample workflows for xsnake
Java
1
star
31

htsnap

JavaScript
1
star
32

scrapers

Ruby
1
star
33

malstor

C++
1
star
34

redscraper

JavaScript
1
star
35

xsnake

HTML
1
star