Coder Social home page Coder Social logo

fu3kingt3pe's Projects

0bin icon 0bin

Client side encrypted pastebin

b374k icon b374k

PHP Webshell with handy features

cms_bas3d icon cms_bas3d

Scanner que tem como intuito procurar possíveis vulnerabilidades em vários tipos de CMS diferentes...

creep3r icon creep3r

This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helping with pentesting and messing around on the net. Currently only have installer files made for Ubuntu & Debian systems, but if you know what you're doing you can easily read them and get what you need to get all the dependencies installed on your own. I made a quick basic demonstration video you to give a general overview of what it has included, you can watch it here: http://youtu.be/z9rq1SBIYI0 Here is another short video to show how the Dorker piece works: http://youtu.be/43aphr0QRng It's a bit of a constant work in progress but will be posting updates from time to time as I add more stuff and get them stabilized and working properly without much issue. If you have any questions, comments, or suggestions just let me know. Thanks, H.R.

droopescan icon droopescan

A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.

dsss icon dsss

Damn Small SQLi Scanner

evil.sh icon evil.sh

:speak_no_evil: Subtle and not-so-subtle shell tweaks that will slowly drive people insane.

exploitdb icon exploitdb

Shell-style script to search exploit-db.com exploits.

fruitywifi icon fruitywifi

FruityWifi is a wireless network auditing tool. The application can be installed in any Debian based system adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq.

gcat icon gcat

A fully featured backdoor that uses Gmail as a C&C server

gpt icon gpt

Gadget Pentesting Tool

hanzoinjection icon hanzoinjection

injecting arbitrary codes in memory to bypass common antivirus solutions

jexboss icon jexboss

JexBoss: Jboss verify and EXploitation Tool

kadimus icon kadimus

Kadimus is a tool to check sites to lfi vulnerability , and also exploit it...

lynis icon lynis

Lynis - Security auditing and hardening tool for Unix/Linux based systems

nmap icon nmap

nmap - unofficial git fork

pitm icon pitm

Python In The Middle : a Python implementation of MITM attacks.

scanner-inurlbr icon scanner-inurlbr

Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.

scripts icon scripts

An unordered collection of various personnal scripts

sn1per icon sn1per

Automated Pentest Recon Scanner

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.