parasite911@kali:~$ whoami
→ Mazen "parasite911" Obed
parasite911@kali:~$ cat interests.txt
→ Malware Development | Virus Analysis | Payload Generation
→ Reverse Engineering | Exploit Development | Red Team Ops
parasite911@kali:~$ cat languages.txt
→ Python | C++ | Assembly | Bash | PowerShell
Popular repositories Loading
-
C2-Profiler
C2-Profiler PublicC2 Framework Fingerprinter: identifies Cobalt Strike, Metasploit, Sliver, Havoc, Covenant, Brute Ratel from PCAP traffic using beacon analysis, URI patterns, JA3, and HTTP headers
Python 3
-
VoidSyscall
VoidSyscall PublicDirect NT Syscall Framework -- Bypass ALL userland hooks via direct syscalls. Hell's Gate, Halos Gate, Tartarus Gate. Assembly + Python.
Python 2
-
ShadowTrace
ShadowTrace PublicETW-based real-time threat detection: process injection, credential theft, LOLBins, AMSI bypass, PowerShell monitoring mapped to MITRE ATT&CK
Python 1
-
GhostWrite
GhostWrite PublicFileless Persistence Engine -- 7 techniques that survive reboot without writing a single file to disk. Pure Go.
Go 1
-
SilentLoader
SilentLoader PublicLinux In-Memory ELF Loader -- Execute binaries from memory via memfd_create, /proc/self/mem, shm_open. Zero disk artifacts. Bash + Python.
Python 1
-
If the problem persists, check the GitHub status page or contact support.