Skip to content
View ahron-chet's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report ahron-chet

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ahron-chet/README.md

About Me

  • C/C++
  • C#
  • Python
  • Assembler
  • Reverse engineering
  • Cloud & on-prem detection engineering

🔭 I’m currently working on enhancing my Command and Control (C2) framework and developing advanced EDR bypass techniques.

🌱 I’m currently learning more about Windows internals, EDR bypassing, and cryptographic algorithms.

👯 I’m looking to collaborate on projects related to malware development and reverse engineering.

Languages and Tools

C C++ C# Python PowerShell KQL Assembly

Current Projects

  • PureLoader: A project demonstrating bypassing Microsoft EDR to run Mimikatz in-memory.
  • Neptoon C2: Advanced C2 tool for various attack simulations.
  • PE Loader w/ EAT Hooking: Manually loading PE files and hooking Export Address Table (EAT) functions.
  • PyCryptoLib: Implementations of RSA, ElGamal, and Diffie-Hellman algorithms in Python.

Popular repositories Loading

  1. GuardBypassToolkit GuardBypassToolkit Public

    A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run Mimikatz in-memory. The project includes an LSASS dumper that u…

    C++ 16 1

  2. my-math-libary my-math-libary Public

    PowerShell 4

  3. Reverse-Shell-managed-through-virustotal-api Reverse-Shell-managed-through-virustotal-api Public

    Reverse Shell managed through virustotal api, to start the shell upload random file to virus total website copy the file hash into the "hashSource" variable on the top of the code, also copy your v…

    Python 4

  4. Efficient-Vulnerability-Scanning-and-Payload-Generation Efficient-Vulnerability-Scanning-and-Payload-Generation Public

    A tool that automates vulnerability scanning and payload generation using Procmon and advanced techniques. It generates reports and payloads in C++ and can be run with options to customize the scan…

    C++ 4

  5. Filelless-keyLogger Filelless-keyLogger Public

    C# 4

  6. Local-Windows-Privilege-escalation Local-Windows-Privilege-escalation Public

    Demonstrating privilege escalation in Windows, enabling a normal user to gain SYSTEM NT AUTHORITY privileges through a combination of techniques.

    C# 4