GithubHelp home page GithubHelp logo
  • šŸ‘‹ Hi, Iā€™m @d3c3ptic0n
  • šŸ‘€ Iā€™m interested in ...
  • šŸŒ± Iā€™m currently learning ...
  • šŸ’žļø Iā€™m looking to collaborate on ...
  • šŸ“« How to reach me ...

d3c3ptic0n's Projects

abusing-roku-apis icon abusing-roku-apis

A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!

all-things-s7 icon all-things-s7

A repository dedicated to all things S7 - Wireshark dissectors, nmap enumeration scripts, and exploits. Dive into the world of Siemens automation with everything from protocol analysis to cross-site scripting exploitation on TIA portal.

anti-virus-evading-payloads icon anti-virus-evading-payloads

During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!

cimsweep icon cimsweep

CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.

commando-vm icon commando-vm

Complete Mandiant Offensive VM (Commando VM), the first full Windows-based penetration testing virtual machine distribution. The security community recognizes Kali Linux as the go-to penetration testing platform for those that prefer Linux. Commando VM is for penetration testers that prefer Windows. We know that building a Windows penetration testing environment can be tedious - we aim to streamline and simplify this process. Commando VM includes over 140 tools.

cve-2021-3156 icon cve-2021-3156

Sudo heap-based buffer overflow privilege escalation commands and mitigations.

cve-2021-40444 icon cve-2021-40444

CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit

dns-fender icon dns-fender

A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.

drupwn icon drupwn

Drupal enumeration & exploitation tool

enumerating-ics-scada-devices icon enumerating-ics-scada-devices

A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I have compiled scans and scripts for targeting Operational Technology (OT) devices and hosts!

foca icon foca

Tool to find metadata and hidden information in the documents.

fortios-backdoor icon fortios-backdoor

Unauthenticated SSL VPN User Password Modification for FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10.

gobuster icon gobuster

Directory/file & DNS busting tool written in Go

graffiti icon graffiti

A tool to generate obfuscated one liners to aid in penetration testing

h8mail icon h8mail

Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamous Breached Compilation torrent

ibombshell icon ibombshell

Tool to deploy a post-exploitation prompt at any time

joomscan icon joomscan

OWASP Joomla Vulnerability Scanner Project

jwtbrute icon jwtbrute

Brute forcing jwt tokens signed with HS256 since 2014

jwtcrack icon jwtcrack

Crack the shared secret of a HS256-signed JWT

kaiser icon kaiser

Fileless persistence, attacks and anti-forensic capabilties.

langhost icon langhost

šŸ‘» A LAN dropbox chatbot controllable via Telegram

linenum icon linenum

Scripted Local Linux Enumeration & Privilege Escalation Checks

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    šŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. šŸ“ŠšŸ“ˆšŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ā¤ļø Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.