-
🧑💻 Offensive Security Researcher.
-
🔭 I’m currently working on Adversary Emulation, Red Team, Malware Research, and Breach & Attack Simulation.
-
👯 I’m looking to contribute on Advanced Evasion Techniques
-
🤝 I’m in love to perform Adversary Emulation and Proactive Threat Hunting
-
👨💻 All of my projects are available at https://offensive-panda.github.io/DefenseEvasionTechniques/
-
📝 I regularly write articles on https://medium.com/@merasor07
-
⚡ Fun fact I think I am funny
Block or Report
Block or report Offensive-Panda
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abusePinned Loading
-
RWX_MEMEORY_HUNT_AND_INJECTION_DV
RWX_MEMEORY_HUNT_AND_INJECTION_DV PublicAbusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
-
DefenseEvasionTechniques
DefenseEvasionTechniques PublicDefense Evasion Techniques Repository. This repository contains a collection of techniques designed to bypass Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) systems.
-
C2_Elevated_Shell_DLL_Hijcking
C2_Elevated_Shell_DLL_Hijcking PublicDLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simp…
-
Chrome-Password-Stealer
Chrome-Password-Stealer PublicI have created a python based exploit which is getting Username, Passwords, Url's from Google Chrome
If the problem persists, check the GitHub status page or contact support.