-
🧑💻 Offensive Security Researcher.
-
🔭 I’m currently working on Adversary Emulation, Red Team, Malware Research, and Breach & Attack Simulation.
-
👯 I’m looking to contribute on Advanced Evasion Techniques
-
🤝 I’m in love to perform Adversary Emulation and Proactive Threat Hunting
-
👨💻 All of my projects are available at https://offensive-panda.github.io/DefenseEvasionTechniques/
-
📝 I regularly write articles on https://medium.com/@merasor07
-
⚡ Fun fact I think I am funny
🎯
Focusing
An infosec guy who's constantly seeking for knowledge.
Block or Report
Block or report Offensive-Panda
Report abuse
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abusePinned
-
RWX_MEMEORY_HUNT_AND_INJECTION_DV
RWX_MEMEORY_HUNT_AND_INJECTION_DV PublicAbusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
-
DefenseEvasionTechniques
DefenseEvasionTechniques PublicDefense Evasion Techniques Repository. This repository contains a collection of techniques designed to bypass Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) systems.
-
C2_Elevated_Shell_DLL_Hijcking
C2_Elevated_Shell_DLL_Hijcking PublicDLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simp…
-
Chrome-Password-Stealer
Chrome-Password-Stealer PublicI have created a python based exploit which is getting Username, Passwords, Url's from Google Chrome
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.