Skip to content
View 28Zaaky's full-sized avatar
  • France

Block or report 28Zaaky

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Shellcode-Ldr Shellcode-Ldr Public

    Advanced shellcode loader with AES-256, EDR/AMSI/ETW bypass, indirect syscalls.

    C 18 6

  2. Usermode-Rootkit Usermode-Rootkit Public

    Complete Windows usermode rootkit with custom C2 server, dropper, and EDR bypass. Features: privilege escalation, process/file/registry hiding, keylogger, reverse shell. Evasion: indirect syscalls,…

    Python 13 2

  3. Stealth-Keylogger Stealth-Keylogger Public

    Advanced Windows keylogger.

    C++ 2

  4. Priv-Escalation-Exploit Priv-Escalation-Exploit Public

    PoC demonstrating a chained UAC bypass and token duplication to illustrate escalation from USER to NT AUTHORITY without inital Admin level.

    C 2 2

  5. IAT-Hooking IAT-Hooking Public

    Single-header Windows library for function hooking by modifying the Import Address Table directly in memory. No external dependencies.

    C++ 1

  6. Malware-Evasion Malware-Evasion Public

    How malware implements anti–reverse engineering techniques such as sandbox and VM evasion, anti-debugging, and memory integrity checks.

    C 6 1