- Alfred Workflow
- Switch DNS This is an useful workflow for switch your DNS.
- CTF & Pentest
- Hashpow Fuck the hash proof of work for ctfer
- Reverse Shell Easy to remember reverse shell.
- JWTTool A jwt tool with Print/Crack/Modify.
- GitHack A
.git
folder disclosure exploit. - Gopher A tool for generate Gopher exp
A tool for generate Gopher exp
File List:
- SHA256.txt
- gopher-darwin-amd64
- gopher-linux-386
- gopher-linux-amd64
- gopher-windows-386.exe
- gopher-windows-amd64.exe
A Git source leak exploit tool that restores the entire Git repository, including data from stash, for white-box auditing and analysis of developers' mind
File List:
- SHA256.txt
- githack-darwin-386
- githack-darwin-amd64
- githack-linux-386
- githack-linux-amd64
- githack-windows-386.exe
- githack-windows-amd64.exe
A jwt tool with Print/Crack/Modify
File List:
- SHA256.txt
- jwttool-darwin-386
- jwttool-darwin-amd64
- jwttool-linux-386
- jwttool-linux-amd64
- jwttool-windows-386.exe
- jwttool-windows-amd64.exe
Easy to remember reverse shell that should work on most Unix-like systems.
Example: https://resh.now.sh/localhost:1337
Luke Childs didn't accept PR#15, so I I made a new one
Reference
https://github.com/Lz1y/reverse-shell
This is an useful workflow for switch your DNS.
Default DNS:
Name | Server IP |
---|---|
8.8.8.8,8.8.4.4 | |
Aliyun | 223.5.5.5,223.6.6.6 |
114 | 114.114.114.114,114.114.115.115 |
You can add your custom DNS Server for your work!
Fuck the hash proof of work for ctfer
File List:
- SHA256.txt
- SHA256_Package.txt
- hashpow-darwin-386
- hashpow-darwin-amd64
- hashpow-linux-386
- hashpow-linux-amd64
- hashpow-windows-386.exe
- hashpow-windows-amd64.exe
I packed by upx, if you want to unpack, just run upx -d *