Skip to content
View xorganic's full-sized avatar
  • Earth

Block or report xorganic

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
xorganic/README.md

☠️ Greetings , I'm xorganic ☠️

An offensive security resercher specialized in Red Team operations APT Emulation.

  • 🕸️ Pursuing Mastery in: Active Directory exploitation techniques, Windows kernel-level development, and advanced OPSEC strategies for Red Team operations.

  • ⚔️ Seeking Allies: Collaboration to develop or enhance tools that mimic sophisticated threat actors and bypass modern security defenses.

  • 💀 Looking for Insight on: Innovative, low-level techniques to improve persistence, stealth, and remote command capabilities in controlled environments for research purposes.

  • 🧩 Repository of Shadows: All of my projects are available at click me

  • ☠️ Talk Red with Me: Ask me about Red Team tactics, malware development, evasion techniques, and offensive security methodologies.

Languages for Trade:

C C++ Assembly Rust

Python Go PowerShell Bash

xorganic's top languages

Pinned Loading

  1. runas-rs runas-rs Public

    Forked from joaoviictorti/runas-rs

    A runas implementation with extra features in Rust

    Rust

  2. ShadowToken ShadowToken Public

    Red Teaming tool for privilege escalation and stealth detection evasion using token manipulation and fileless injection techniques.

    C++ 2

  3. TSM TSM Public

    A tool for stealth persistence and bypassing security controls on Windows systems through shadow cache manipulation and direct syscall invocation.

    C 1

  4. FastFluxEvader FastFluxEvader Public

    Tool for obfuscating payloads in hexadecimal format for evasion in security testing and Red Team engagements.

    C++

  5. Cloakk Cloakk Public

    Stealth AMSI Bypass and Encrypted PowerShell Executor

    C