Coder Social home page Coder Social logo

649's Projects

apache-struts-shodan-exploit icon apache-struts-shodan-exploit

This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.

apt38-dyepack icon apt38-dyepack

Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.

arduino-badusb icon arduino-badusb

Arduino badUSB framework for launching HID payloads. Comes with preconfigured payload selector and web service. Uses Arduino Leonardo board, LCD keypad, and ethernet shield.

basic-keylogger icon basic-keylogger

Windows based keylogger (written in C++). Collects all keystrokes and places them in a file "LOG.txt" in the same directory as its binaries.

binary-search icon binary-search

Binary search is a search algorithm that finds the position of a target value within a sorted array.

binary-search-tree icon binary-search-tree

A binary search tree (BST) is a binary tree where each node has a comparable key (and an associated value) and satisfies the restriction that the key in any node is larger than the keys in all nodes in that node's left subtree and smaller than the keys in all nodes in that node's right subtree.

broadpwn icon broadpwn

This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main CPU kernel, causing it to crash. More information about its origins here: http://boosterok.com/blog/broadpwn2/

chrome-sandbox-exploit icon chrome-sandbox-exploit

[Patched] Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth tokens to remote server. More info: https://bugs.chromium.org/p/chromium/issues/detail?id=386988

crash-ios-exploit icon crash-ios-exploit

Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see the Unicode. Please do not intentionally abuse these exploits.

crashcast-exploit icon crashcast-exploit

This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io

cve-2017-5415 icon cve-2017-5415

Addressbar spoofing through blob URL (Firefox browser). An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by blob: as the protocol, leading to user confusion and further spoofing attacks.

eqgrp-trickortreat icon eqgrp-trickortreat

The ORIGINAL decrypted copies of the Shadow Broker's Trick Or Treat release. Contains a list of servers, supposedly compromised by Equation Group as well as references to seven supposedly undisclosed tools (DEWDROP, INCISION, JACKLADDER, ORANGUTAN, PATCHICILLIN, RETICULUM, SIDETRACK AND STOCSURGEON) also used by the threat actor.

eqgrp-warez icon eqgrp-warez

The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primarily for compromising Linux/Unix based environments. Use for research purposes only. (ref: eqgrp-auction-file.tar.xz)

equationdrug icon equationdrug

The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use for research purposes only.

fuzzbunch icon fuzzbunch

The ORIGINAL decrypted copies of the Shadow Broker's Lost In Translation release. Contains FuzzBunch, DanderSpritz, and all the other NSA [Equation Group] toolkits. Please use them only for researching purposes.

gpt4all-ui icon gpt4all-ui

Simple Docker Compose to load gpt4all (Llama.cpp) as an API and chatbot-ui for the web interface. This mimics OpenAI's ChatGPT but as a local instance (offline).

hash-table icon hash-table

A hash table is a data structure that implements an associative array abstract data type, a structure that can map keys to values. Lookups are O(1). Collisions are solved using chaining method in which chained indexes are O(n).

heap-sort icon heap-sort

Heapsort is a comparison-based sorting algorithm. Heapsort can be thought of as an improved selection sort: like that algorithm, it divides its input into a sorted and an unsorted region, and it iteratively shrinks the unsorted region by extracting the largest element and moving that to the sorted region.

huffman-codes icon huffman-codes

A Huffman code is a particular type of optimal prefix code that is commonly used for lossless data compression.

insertion-sort icon insertion-sort

Insertion sort is a simple sorting algorithm that builds the final sorted array (or list) one item at a time.

invisible-login-forms icon invisible-login-forms

Stealing user credentials by injecting invisible login forms that the native browser autofills data to. More info: https://freedom-to-tinker.com/2017/12/27/no-boundaries-for-user-identities-web-trackers-exploit-browser-login-managers/

leonardo-hid-payload-v1.0 icon leonardo-hid-payload-v1.0

Human Interface Device Payload that allows your Arduino Leonardo board to execute commands by emulating a keyboard and accessing a terminal with elevated privileges on Windows based machines.

leonardo-hid-payload-v2.2 icon leonardo-hid-payload-v2.2

Less code, faster execution, clean UAC bypass, clears execution history, and more button and LED functions added. (HID Payload for Arduino, see previous version)

linked-list icon linked-list

A linked list is a linear data structure where each element is a separate object. Each element (we will call it a node) of a list is comprising of two items - the data and a reference to the next node. The last node has a reference to null. The entry point into a linked list is called the head of the list.

matrix-chain-multiplication icon matrix-chain-multiplication

Dynamic programming algorithm: matrix chain multiplication, where the goal is to find the most computationally efficient matrix order when multiplying an arbitrary number of matrices in a row.

max-subarray icon max-subarray

The maximum subarray problem is the task of finding the contiguous subarray within a one-dimensional array, a[1...n], of numbers which has the largest sum. This script solves the max subarray problem via divide-and-conquer with O(nlogn) time complexity.

memcrashed-ddos-exploit icon memcrashed-ddos-exploit

DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API

memfixed-mitigation-tool icon memfixed-mitigation-tool

DDoS mitigation tool for sending flush or shutdown commands to vulnerable Memcached servers obtained using Shodan API

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.