GithubHelp home page GithubHelp logo

S!Ns's Projects

badkarma icon badkarma

advanced network reconnaissance toolkit

blackeye icon blackeye

The most complete Phishing Tool, with 32 templates +1 customizable

cmseek icon cmseek

CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and 80 other CMSs

darling icon darling

Darwin/macOS emulation layer for Linux

datasploit icon datasploit

An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.

dcipher icon dcipher

Decipher hashes using online rainbow & lookup table attack services.

dvr-exploiter icon dvr-exploiter

DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995

kemon icon kemon

An Open-Source Pre and Post Callback-Based Framework for macOS Kernel Monitoring.

leaked icon leaked

Leaked? 1.1 - A Checking tool for Hash codes and Passwords leaked

leakscraper icon leakscraper

LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.

netattack icon netattack

A simple python script to scan and attack wireless networks.

netattack2 icon netattack2

An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.

network-attacker icon network-attacker

Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attack "

nodexp icon nodexp

NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities

remote-desktop-caching- icon remote-desktop-caching-

This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.

smbetray icon smbetray

SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over the wire in cleartext.

telewreck icon telewreck

A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.