The Wayback Machine - https://web.archive.org/web/20220601172811/https://github.com/mgeeky
Skip to content
Avatar
💭
Wanna sip a sencha?
💭
Wanna sip a sencha?

Sponsors

@a7t0fwa7 @josephkingstone @KyleEvers @fashionproof
@JamesIT @RedTeams @ep1nephrine @C0axx
@Art-Fakt

Achievements

Achievements

Block or Report

Block or report mgeeky

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mgeeky/README.md

mgeeky's code lair

LinkedIn Twitter GitHub

Hi! I'm Mariusz, an Offensive Security afficionado. Been solving IT Security problems from both defensive and offensive sides of the barricade for more than 14 years by now out of which eight profesionally. I was always more attracted to sharing knowledge through my code, tools, scripts, exploits rather than writing blog posts. With that on the table, this Github account acts as my legacy. 😄

🎓 My area of expertise is Windows & Networks security assessments. Started as a Malware Analyst, pushed my career through all sorts of technical roles & challenges to land myself in Red Team operator's shoes evaluating holistically my Customer's cyber-defensive programmes.

I'm a holder of following cybersecurity/IT certificates: CARTP, CRTE, CRTP, eCPTX, CCNA, CREST CRT, OSCP, OSCE, OSWP .

Welcome to my Github lair where you'll find all sorts of security-related tools of hopefully decent quality.

❤️ If you ever benefited from my projects, tools, scripts, pull requests - if you ever saw my work helpful to others, it would be really awesome if you could consider supporting these efforts through my Github Sponsors page. You'll receive an exclusive access to my private repositories containing a few other high quality tools and utilities greatly improving Red Teams delivery. Show some love and support - consider buying me a coffee or better a beer - as a way of saying thank you! 💪

Cheers!

mgeeky's GitHub Stats

Pinned

  1. A collection of more than 170+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at lea…

    PowerShell 1.2k 282

  2. My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+

    PowerShell 646 110

  3. Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.

    C++ 548 101

  4. RedWarden Public

    Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation

    Python 543 103

  5. An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents

    C++ 485 96

  6. OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup

    C# 346 51

799 contributions in the last year

Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Mon Wed Fri

Contribution activity

June 1, 2022

8 contributions in private repositories Jun 1