r00t-3xp10it Goto Github PK
Name: pedro ubuntu
Type: User
Company: @Suspicious-Shell-Activity
Bio: "Be a hacker not a criminal"... Pentester | IT enthusiastic | blogger
Location: Lisbon - portugal
Name: pedro ubuntu
Type: User
Company: @Suspicious-Shell-Activity
Bio: "Be a hacker not a criminal"... Pentester | IT enthusiastic | blogger
Location: Lisbon - portugal
Small and highly portable detection tests based on MITRE's ATT&CK.
transform your payload.exe into one fake word doc (.ppt)
A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.
POCs for Shellcode Injection via Callbacks
Hack Cameras CCTV FREE
Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)
How to spoof the command line when spawning a new process from C#.
Cobalt wipe is the non-commercial version of Cobalt-Strike 4.3 (May 2021 Release)
Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.
DKMC - Dont kill my cat - Malicious payload evasion tool
Obfuscate your python script by converting it to emoji icons
Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)
Use a Fake image.jpg to exploit targets (hide known file extensions)
collection of articles/books about programing
ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
C2 Powershell Command & Control Framework with BuiltIn Commands
Meterpreter Paranoid Mode - SSL/TLS connections
Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)
My collection of metasploit auxiliary post-modules
Transferring Backdoor Payload by BSSID and Wireless traffic
MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --
My collection of nmap nse modules
Transform your batch (bat) script into one binary.exe
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Metasploit_postgresql_database_connection_fix
Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, lateral movement, reverse shell, etc.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.