Coder Social home page Coder Social logo

caoimhinp's Projects

jexboss icon jexboss

JexBoss: Jboss verify and EXploitation Tool

jmsdigger icon jmsdigger

JMSDigger is JMS API basedEnterprise Messaging Application assessment tool

jtagsploitation icon jtagsploitation

scripts and examples for using JTAG debug tools to gain root access

keefarce icon keefarce

Extracts passwords from a KeePass 2.x database, directly from memory.

kekeo icon kekeo

A little toolbox to play with Microsoft Kerberos in C

killerbee icon killerbee

IEEE 802.15.4/ZigBee Security Research Toolkit

korelogic-rules icon korelogic-rules

Updated version of the 2010 KoreLogic password cracking rules for John the Ripper

kunai icon kunai

pwning & info gathering via user browser

kvasir icon kvasir

Kvasir: Penetration Test Data Management

luckystrike icon luckystrike

A PowerShell based utility for the creation of malicious Office macro documents.

magspoof icon magspoof

MagSpoof is a portable device that can spoof/emulate any magnetic stripe or credit card "wirelessly", even on standard magstripe readers.

malware icon malware

Course materials for Malware Analysis by RPISEC

malware-1 icon malware-1

Malware Samples. Uploaded to GitHub for those want to analyse the code.

mcir icon mcir

The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of configurable vulnerability testbeds.

mdp icon mdp

A command-line based markdown presentation tool.

medusa icon medusa

An open source interactive disassembler

meterssh icon meterssh

MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network.

mimikatz icon mimikatz

A little tool to play with Windows security

mimikittenz icon mimikittenz

A post-exploitation powershell tool for extracting juicy info from memory.

nishang icon nishang

Nishang - PowerShell for penetration testing and offensive security.

novahot icon novahot

A webshell framework for penetration testers.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.