Coder Social home page Coder Social logo

Abdulkadir Güngör's Projects

dpapi icon dpapi

Information stored in applications is decrypted using DPAPI. In this way, attacker passwords may be captured. For use in attack scenarios, two applications written in Python language have been developed that steal the information stored in internet browsers: 1-Browser Stealer, 2-Browser Stealer Report

file_research_library icon file_research_library

"File Research Library" <Language:English>It helps you examine document type files.</Language:English><Language:Turkish>Doküman türü dosyaları incelemenize yardımcı olur.</Language:Turkish>

ghost icon ghost

"Ghost (RAT)" -> Reverse shell and management console for Windows

gngr_local_keylogger_for_windows icon gngr_local_keylogger_for_windows

(On 06/04/2021) Local Keylogger software has been made for the latest up-to-date "Windows 7, 8 and 10" operatings systems. It managed to circumvent the "Windows Defender" program.

gngr_network_tools icon gngr_network_tools

It is a tool for Windows operating systems that offer features such as "Show interface, Port scanner, network scanner, tracing route to ip, show registered wi-fi(s) and password"

gngr_proxy_harvester icon gngr_proxy_harvester

It checks the free proxy addresses it collects from websites and saves the working proxy addresses to the file.

gngr_remote_keylogger icon gngr_remote_keylogger

(On 09/04/2021) Remote Keylogger software has been made for the latest up-to-date "Windows 7, 8 and 10" operatings systems. It managed to circumvent the "Windows Defender" program.

gngr_requests icon gngr_requests

Allows creating and tracking http and https protocol calls. It also supports Proxy.

htmlsmuggling icon htmlsmuggling

HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the payload on the targeted device when the victim opens/clicks the HTML attachment/link. The HTML smuggling technique leverages legitimate HTML5 and JavaScript features to hide malicious payloads and evade security detections. The HTML smuggling method is highly evasive. It could bypass standard perimeter security controls like web proxies and email gateways, which only check for suspicious attachments like EXE, DLL, ZIP, RAR, DOCX or PDF

jpgtomalware icon jpgtomalware

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.

process_monitoring_tools icon process_monitoring_tools

It is a program written in Python3 in order to facilitate process analysis and to easily access Windows process tools. In this way, it facilitates malware analysis processes. In addition, processes running in the background can be detected.  After the program is started, it continues to run in the background. Afterwards, the tools can be accessed on the system tray.

pssw100avb icon pssw100avb

A list of useful Powershell scripts with 100% AV bypass (At the time of publication).

scapy_library_for_wifi icon scapy_library_for_wifi

"Scapy Library For Wifi" (Eğitim amacıyla) Scapy Kütüphanesindeki fonksiyonları kullanan WiFi bağlantısına yönelik betik kodlardır. Kullanılmak amacıyla kendi kütüphane fonksiyonları oluşturulmuştur. Kali linux işletim sisteminde kullanılmak için geliştirilmiştir.

shodan_search icon shodan_search

Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.

simple_malware_analysis_for_documents icon simple_malware_analysis_for_documents

"Simple Malware Analysis For Documents"<Language:English>It helps you to analyze in document type files. </Language:English><Language:Turkish>Doküman türü dosyalarda analiz yapmanıza yardımcı olur.</Language:Turkish>

sqlite3 icon sqlite3

It is a github directory that covers projects such as sqlite3 database usage, operation and recovery of deleted data using Python language.

ziptomalware icon ziptomalware

It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executable or payload in the zip/rar file without any action. In this way, it can be triggered and run by documents in the compressed file or in the same folder. The second method encrypts the executable file or payload and it also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime. Both methods do not damage the rar/zip file. It is not detected by users. However, the first method can be detected by the antivirus depending on the code embedded.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.