Coder Social home page Coder Social logo

chertogun's Projects

depix icon depix

Recovers passwords from pixelized screenshots

dfir-notes icon dfir-notes

Random notes collected on the intertubes relating to DFIR

django-notebook icon django-notebook

Any IPython notebook used for my "using ipython notebook for Django model analysis" talk

donut icon donut

Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

dorknet icon dorknet

Selenium powered Python script to automate searching for vulnerable web apps.

dpibuy icon dpibuy

GoodbyeDPI—Passive Deep Packet Inspection blocker and Active DPI circumvention utility (for Windows)

dvr-exploiter icon dvr-exploiter

DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995

echelon-stealer-v5 icon echelon-stealer-v5

☣️ Stealer Chromium Browsers v81, Firefox 76, Gecko Browsers, Crypto Wallets, and 20+ Program

ehtools icon ehtools

Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.

empire icon empire

Empire is a PowerShell and Python post-exploitation agent.

esp-rfid-tool icon esp-rfid-tool

A tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed directly into an existing installation. Provides access to a web based interface using WiFi in AP or Client mode. Will work with nearly all devices that contain a standard 5V Wiegand interface. Primary target group is 26-37bit HID Cards. Similar to the Tastic RFID Thief, Blekey, and ESPKey.

evil-winrm icon evil-winrm

The ultimate WinRM shell for hacking/pentesting

evilclippy icon evilclippy

A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.

evildll icon evildll

Malicious DLL (Reverse Shell) generator for DLL Hijacking

evilfoca icon evilfoca

Tool to analyze and test security in IPv4 and IPv6 data networks

eviloffice icon eviloffice

Inject Macro and DDE code into Excel and Word documents (reverse shell)

evilreg icon evilreg

Reverse shell using Windows Registry files (.reg)

evilurl icon evilurl

Generate unicode evil domains for IDN Homograph Attack and detect them.

excel4-dcom icon excel4-dcom

PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)

exe2image icon exe2image

A simple utility to convert EXE files to JPEG images and vice versa.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.