Hi! I'm Mariusz, an Offensive Security afficionado. Been solving IT Security problems from both defensive and offensive sides of the barricade for more than 14 years by now out of which seven profesionally. I was always more attracted to sharing knowledge through my code, tools, scripts, exploits rather than writing blog posts.
This Github account acts as my way to say thank you to the community from which I've taken & learned so much. The natural move for me was to give back to the community by releasing lots of my projects, gists, tools and contribute to plenty other open-source projects in hope to bring better quality. That costed me countless hours, sleepless nights.
Some of my private repositories shared with my Sponsors include:
ProtectMyToolingPoloniumBOF.NETCarbuncleSharpPRTcobalt-initial-opsecazure-functions-redirectordigitalocean-app-redirectorMyStayKitAnonymize_CS_Logsmgeeky-gists- and more..
Kind regards,
Mariusz Banach.
Thanks for your time and consideration!
55 sponsors are funding mgeeky’s work.
2 ** 6 = 64 - is quite a 31337 number for any hacker out there who transited all his assembly codes from x86 to x64. It reminds me long hours of troubleshooting __stdcall => __fastcall issues, register widths and how they messed up with my shellcodes & encoders several years back. That's exactly why I love this number and I wish someday to have that many supporting me kind hackers, who just like me remember that bitness wizardry of old times! :-)
Featured work
-
mgeeky/Penetration-Testing-Tools
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at lea…
PowerShell 1,542 -
mgeeky/cobalt-arsenal
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
PowerShell 674 -
mgeeky/ThreadStackSpoofer
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
C++ 662 -
mgeeky/RedWarden
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
Python 594 -
mgeeky/ShellcodeFluctuation
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
C++ 533 -
mgeeky/Stracciatella
OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup
C# 370
Select a tier
$10 a month
SelectThe Observer
- Get a Sponsor badge on your profile
- Express your gratitude for the community sharing idea I'm cultivating
- Give me a nudge to keep working harder while participating in a global cyber-resilience improvement effort
$20 a month
SelectThe Supporter
You use my software and want to get access to my over 12+ private, sponsorware Offensive Security Tooling (OST) - exclusively available to sponsors, who just like yourself are InfoSec Professionals.
Perks:
- Access to my Sponsorware Github organisation bringing 12+ repositories
ProtectMyTooling- a multi-packer bringing 25+ obfuscators on boardpolonium- AV/EDR benchmarking utility equipped with a fair share of evasion tactics- improved
BOF.NET- in-process .NET execution, say good bye to fork & runexecute-assembly - improved
Carbuncle- complete Outlook dominance via COM interop - and many others!
$40 a month
SelectThe Generous Supporter
You use my software a lot - perhaps you're a fan of the idea I cultivate - and want to support my Open Source work, but $20 feels too low for the value you're getting out of it.
Perks:
- Access to my Sponsorware Github organisation bringing 12+ repositories
ProtectMyTooling- a multi-packer bringing 25+ obfuscators on boardpolonium- AV/EDR benchmarking utility equipped with a fair share of evasion tactics- improved
BOF.NET- in-process .NET execution, say good bye to fork & runexecute-assembly - improved
Carbuncle- complete Outlook dominance via COM interop - and many others!
- Have your bug reports prioritized
$100 a month
SelectThe Organization
Recommended for commercial use
Your organization uses my Offensive Security Tools (OST) for its engagements and wants to make sure that my software is well-maintained, stable and safe to use for the years to come. You agree that $100 a month (less than 1 hour of a skilled Penetration Tester / Security Consultant) is a rightous investment into a passionate offensive developer solving tons of security testing problems during his off hours.
Perks:
- Access to my Sponsorware Github organisation bringing 12+ repositories
- Have your bug reports prioritized
- Optional: link + logo in a choosen repository's README

