Skip to content
View Offensive-Panda's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report Offensive-Panda

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Offensive-Panda/README.md

Hi 👋, I'm Usman Sikander (a.k.a Offensive-Panda)

An infosec guy who's constantly seeking for knowledge. Do purple 💜, but more in love with Red ❤️.

portfolio

offensive-panda

  • 🧑‍💻 Offensive Security Researcher.

  • 🔭 I’m currently working on Adversary Emulation, Red Team, Malware Research, and Breach & Attack Simulation.

  • 🤝 I’m in love to perform Adversary Emulation and Proactive Threat Hunting

  • 📝 I regularly write articles on https://medium.com/@merasor07

  • ⚡ Fun fact I think I am funny

Connect with me:

usmansikander13 usman-sikander13

Languages and Tools:

c

cplusplus csharp css3 html5 python

offensive-panda

 offensive-panda

offensive-panda

Pinned Loading

  1. ShadowDumper ShadowDumper Public

    Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…

    C++ 315 57

  2. ProcessInjectionTechniques ProcessInjectionTechniques Public

    This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at the forefront of the field. It serves as a central repository…

    C++ 262 34

  3. RWX_MEMEORY_HUNT_AND_INJECTION_DV RWX_MEMEORY_HUNT_AND_INJECTION_DV Public

    Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.

    C++ 245 47

  4. LsassReflectDumping LsassReflectDumping Public

    This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is created, it utilizes MINIDUMP_CALLBACK_INFORMATION callb…

    C++ 171 25

  5. DefenseEvasionTechniques DefenseEvasionTechniques Public

    This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those ded…

    C++ 77 13

  6. .NET_PROFILER_DLL_LOADING .NET_PROFILER_DLL_LOADING Public

    .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit is loading a malicious DLL using Task Scheduler (MMC) to bypa…

    C++ 42 11