bdpinkman Goto Github PK
Type: User
Company: CS, UCR
Bio: Security Researcher
Location: CA
Type: User
Company: CS, UCR
Bio: Security Researcher
Location: CA
RAT/Keylogger/Crypters
Popular algorithms on C#, data structures and solutions for Cracking the Code Interview
Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.
Malware Suite/Menu designed for "Speedy and No-Mistakes Penetration Testing", written in Python 2.7.13 and tested on Kali Linux 4.6 & 4.9, originally intended to only perform the Reconnaissance and Enumeration Stages (it's role is dramatically expanded now). Requires Python 2.7 + Pip + Termcolor Module. All code is entirely free to be used in your own projects. To install, you can either run the "autoInstallLinux.sh" script after "chmod 777" first, OR you can manually create the /root/ArmsCommander directory, copy everything in there, and then type "python /root/ArmsCommander/ArmsCommander.py"
Detect a bitcoin address in the clipboard and replace it by one written in the program.
A very simple BlockChain implementation in PHP https://github.com/rhondle/BlockChain
Database of malware (botnets, mostly), catched on telnet honeypot, including standard analysis outputs.
This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
What if monit was a botnet?
Exam Prep for the Ec-council Certified Ethical Hacker 312-50
Hive, a major component of the CIA infrastructure to control its malware.
A simple, fully python ransomware PoC
Hacking, Malware and Cybersecurity
CSR2F is a Python tool used for generating CSRF (Cross-Site Request Forgery) exploits
Java Code to generate a CSRF POC
Heartbleed variants
Automated Cyber Offense
Crypter source code for malware
A PHP tool to perform dictionary attacks on Gmail, Microsoft Live and Hotmail accounts.
漏洞学习
POC scripts, code, and tools that are not in other packages that I am working on.
sebug.net上面的镜像
Reverse engineered some bits of the FIN7 malware
This repository contains a Python-based Keylogger which is capable of recording all the keystrokes of the victim machine on which it is installed. It it fully undetectable by all the wellknown antivirus softwares and makes use of the pyhook and pythoncom packages to capture the keyboard events and messages.
APT, Cyber warfare, Penetration testing, Zero-day,Exploiting, Spyware,Malwares evade anti-virus detection, Rookit CYPTER, Antiviruses Bypassing-av, WORMS,Sandbox-Escape, Memory-injection, Ethical,Gray,White,RedTeam...
Heartbleed OpenSSL exploit
Honeypot for Heartbleed
An attempt to create a cross-plateform java Remote Administration Tool.
Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code
Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.