-
🧑💻 Offensive Security Researcher.
-
🔭 I’m currently working on Adversary Emulation, Red Team, Malware Research, and Breach & Attack Simulation.
-
🤝 I’m in love to perform Adversary Emulation and Proactive Threat Hunting
-
📝 I regularly write articles on https://medium.com/@merasor07
-
⚡ Fun fact I think I am funny
-
Cytomate solutions and services
- Qatar
- https://offensive-panda.github.io
- in/usman-sikander13
- @usmansikander13
- https://www.cytomate.net
Pinned Loading
-
ProcessInjectionTechniques
ProcessInjectionTechniques PublicThis comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at the forefront of the field. It serves as a central repository…
-
RWX_MEMEORY_HUNT_AND_INJECTION_DV
RWX_MEMEORY_HUNT_AND_INJECTION_DV PublicAbusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
-
ShadowDumper
ShadowDumper PublicShadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…
-
LsassReflectDumping
LsassReflectDumping PublicThis tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is created, it utilizes MINIDUMP_CALLBACK_INFORMATION callb…
-
DefenseEvasionTechniques
DefenseEvasionTechniques PublicThis comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those ded…
-
.NET_PROFILER_DLL_LOADING
.NET_PROFILER_DLL_LOADING Public.NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit is loading a malicious DLL using Task Scheduler (MMC) to bypa…
If the problem persists, check the GitHub status page or contact support.