Sulaiman
byt3n33dl3
M A L W A R E H A V O C
Languages
Top Repositories
Adversarial frameworks for Android and iOS sandbox evasion.
Defense evasion collections and pentesting frameworks for assessment, following Greenbone and openVAS.
Internal data collector for BloodHound and BlackMarlinExec pathway strategies, and attack surface elimination.
CLI application for credentials recovery, converting and multi-threaded cracking mechanism for online and offline scenario.
Seven Degrees of Domain Admin
World's most advanced mobile security frameworks and surveillance.
Repositories
102Latest WannaCry ransomware version (2.0) for adversary emulation assessment, encripting Program Files (x86), Program Files (x64), Program Files: (.doc, .docx, .xls, .xlsx, .ppt, .pptx, .pst, .ost, and more).
AdverXaries (org) page
Another macOS ASLR bypass methodologies
iCloud security assessor.
Defense evasion collections and pentesting frameworks for assessment, following Greenbone and openVAS.
Adversarial frameworks for Android and iOS sandbox evasion.
Data collector in Python for BloodPengu APM
macOS 26.X Panic attack for Insecure Kernel
Extracting LSASS via physical memory read primitives in vulnerable kernel binary and drivers
World's most advanced mobile security frameworks and surveillance.
AI ChatBox and LLM Pentesting frameworks (https://chatgpt.com) with power of NER tagging models.
Crawler malware through SMB share or LDAP queries, (require Administrator access for DCSync atttack).
Obfuscated Pegasus Spyware.
Internal data collector for BloodHound and BlackMarlinExec pathway strategies, and attack surface elimination.
World's most advanced Mach-O and TCC binary malware for macOS or Unix-based distro.
Six Degrees of Enterprise Domain Admin
Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.
Offshore for LLMNR/NBT-NS Poisoning and abuse for PrivEsc.
WebApp and HTTP forms for crawling and spidering frameworks in bug bounty.
CLI application for credentials recovery, converting and multi-threaded cracking mechanism for online and offline scenario.
Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many operating systems, using CPUs, GPUs, and even some FPGAs.
.NET red-teaming framework (4.0) for Windows C2 adversary scenario, an advanced stealth-agent.
Seven Degrees of Domain Admin
C2 frameworks for RTO, server and implants for stealth red-teaming mode.
Swiss army knife kit for Nmap
The smart custom implant agent for Amanor and CarpaAlko frameworks.
Network authentication Pentesting tools and hardening assessment frameworks.
🧛🏻 Vulnerability discovery frameworks based on https://projectdiscovery.io
httpx frameworks.
Custom BloodHound graph, connecting relationships for Attack-paths.