Skip to content
View jakobfriedl's full-sized avatar
🔱
🔱

Block or report jakobfriedl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jakobfriedl/README.md

Header

{
  "occupation": "penetration tester / red teamer",
  "currently_working_on": [
    "c2 development",
    "red team ops & infrastructure"
  ],
  "certs": [
    "osep",
    "oscp",
    "oswp",
    "crto",
    "maldev academy",
    "htb pro labs (aptlabs, cybernetics, alchemy, offshore, zephyr, rastalabs, dante)"
  ] 
}

Pinned Loading

  1. conquest conquest Public

    Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.

    Nim 330 39

  2. conquest-modules conquest-modules Public

    Modules designed to be used with the Conquest framework.

    Python 17 1

  3. precompiled-binaries precompiled-binaries Public

    Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments

    PowerShell 257 62

  4. jakobfriedl.github.io jakobfriedl.github.io Public

    Personal website & blog

    HTML 1

  5. BenevolentLoader BenevolentLoader Public

    Shellcode loader using direct syscalls via Hell's Gate and payload encryption.

    C 102 18

  6. malware-development malware-development Public

    Progressing on my malware development journey.

    C 14 3