Skip to content
View senzee1984's full-sized avatar

Block or report senzee1984

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
senzee1984/README.md

Hi there, I'm Senzee πŸ‘‹

Welcome to my GitHub profile!

πŸš€ About Me

  • πŸ‘¨β€πŸ’Ό I work at an International Organization, where I serve as an Information Security Analyst.
  • 🏒 My role involves Penetration Testing, Red Teaming, Purple Teaming, Security Research, and Offensive R&D.
  • 🌐 My areas of interest include Malware, Evasion Techniques, Windows Internal, and Offensive Development.
  • πŸ’‘ I am passionate about Evasion, Stealth, and Bypass techniques.

🌐 Connect with me

Twitter Personal Website GitHub

πŸ“Š GitHub Stats

πŸ”₯ My Projects

ReadMe Card ReadMe Card ReadMe Card ReadMe Card

πŸ† GitHub Trophies

trophy


Thank you for visiting my profile. Feel free to explore my repositories and connect with me!

Pinned Loading

  1. Amsi_Bypass_In_2023 Amsi_Bypass_In_2023 Public

    Amsi Bypass payload that works on Windwos 11

    PowerShell 369 66

  2. InflativeLoading InflativeLoading Public

    Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.

    Python 265 59

  3. MutationGate MutationGate Public

    Use hardware breakpoint to dynamically change SSN in run-time

    C++ 232 34

  4. micr0_shell micr0_shell Public

    micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.

    Python 152 22

  5. EDRPrison EDRPrison Public

    Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry

    C# 274 30

  6. Windows_x64_Tcp_Reverse_Shell_Shellcode Windows_x64_Tcp_Reverse_Shell_Shellcode Public

    Null-free shellcode for TCP reverse shell on Windows x64

    Python 51 11