Coder Social home page Coder Social logo

Yasiru Senerath Karunanayaka's Projects

achat icon achat

This is a server-client program. You can connect multiple clients to the server and begin chatting with other clients like hackers. You can use your own encryption to send messages. And communicate anonymously.

backdoorproject icon backdoorproject

This is a Server & Client program. But in advance it has the feature of connect back to server though the IP of server changed.

jam2.x icon jam2.x

This is a project for Raspberrypi Jam 2.x.

lioncub icon lioncub

Lion Cub is a Basic but power full framework for hacking beginners. This frame work has the ability to create reverse TCP backdoors, Keyloggers also it has the ability to do ARP spoofing attacks, MAC address changing, DNS spoofing attacks, WPA2 handshake capture automation etc. This is a hobby project to concentrate all my ethical hacking projects done earlier.

mentalcrack icon mentalcrack

This is a powerfull wordlist creator. This program will take some keywords binders and suffixes and create a powerfull wordlist for you

microgreycodes icon microgreycodes

These are micro codes written for the use of anybody who wants to start netwok programming

php_login_project icon php_login_project

This is a very basic and nice looking php login project. This includes all the basic login system stuff like pwd reset tokens email. However I made this little project to check security of that.

starcomm icon starcomm

Star Comm is a telecommunication project. Which I targeted for high level specification. This is a electronics project. So make sure to checkout Altium project files

ykey_keylogger icon ykey_keylogger

This is a small framework for generate and listen to Keylogger malwares... And also the most effective and most useful feature about this Keylogger malwares is they don't communicate through email with the hackers. It uses a MYSQL databases to communicate. So you will not face to any email issues. Not only that but also using this framework you can have a log of your victims their mac addresses and also their key logs. You can connect back to a victims no matter what your routers dynamic public IP address is.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.