Skip to content
View anonymous300502's full-sized avatar
๐Ÿ 
Working from home
๐Ÿ 
Working from home

Block or report anonymous300502

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
anonymous300502/README.md

Hi, I'm Abhishek Sharma! ๐Ÿ‘‹

๐Ÿš€ Offensive Security & Red Team Enthusiast

I'm a SOC Analyst passionate about cybersecurity, specializing in offensive security and red teaming. I develop cutting-edge tools to explore vulnerabilities and demonstrate the importance of strong security measures.

Profile Stats

๐Ÿ”ง Projects

  • PyPi: A python library uploaded on PyPi to create encrypted reverse shells with session management capability.
  • NukeAMSI: A powerful tool to bypass AMSI in memory for seamless exploitation.
  • Alleyes: Python-based spyware for keystroke logging.
  • RansomPy: A ransomware tool that fully encrypts the target system.
  • Supereworm: A destructive worm that erases hard drives.
  • Berzerk: A post-exploitation backdoor with C2 capabilities.
  • Peek-A-Boo: A persistence maintaining software for live screen sharing and remote access with mouse and keystrokes accessablility.

๐Ÿ“ซ How to reach me:

LinkedIn: Abhishek sharma

Pinned Loading

  1. Nuke-AMSI Nuke-AMSI Public

    NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.

    PowerShell 158 39

  2. DopeShellPyPi DopeShellPyPi Public

    Python 2 2

  3. alleyes alleyes Public

    A sophistocated spyware made in python to get keystrokes of a victim

    Python 4 2

  4. RansomPy RansomPy Public

    A ransomware which fully encrypts the target system and then encrypts the key itself, The key can only be decrypted by the attacker. It also starts a timer and displays a ransom note which cannot bโ€ฆ

    Python 3 2

  5. Berzerk Berzerk Public

    Berzerk is a post exploitation persistence maintaining backdoor along with C2 (COMMAND & CONTROL ) server. The powershell payload provided is currently undetectable by the latest updated version ofโ€ฆ

    PowerShell 2 2

  6. supereworm supereworm Public

    A computer worm that fills up the hard drive keeping files hidden or deletes and format the drives so that they cant be recovered using forensic tools.

    Python 2 2