GH0ST_3exP10it 's Projects
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Summary of Cyber Security interview questions I have been through, hope this helps
Asset inventory on public bug bounty programs.
Proof-of-concept obfuscation toolkit for C# post-exploitation tools
Socks proxy, and reverse socks server using powershell.
Penetration testing utility and antivirus assessment tool.
This tool shows how OS 16 communicates with Apple services outside an active VPN tunnel.
iOS platform security & anti-tampering Swift library
Auto IP or Domain Attack Tool ( #1 )
This Python script can be used to bypass IP source restrictions using HTTP headers.
π IP Tools Fast Sh*t β‘οΈ
UAC bypass for x64 Windows 7 - 11
This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!
A password strength test app with strength, estimated crack times, warnings and suggestions to help make better passwords.
J2EEScan is a plugin for Burp Suite Proxy. The goal of this plugin is to improve the test coverage during web application penetration tests on J2EE applications.
Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients
The cheat sheet about Java Deserialization vulnerabilities
A Python obfuscator using HTTP Requests and Hastebin.
Jeeves SQLI Finder
πΈ Scans any of your local Docker images for security vulnerabilities. π
JFβ‘can - Super fast port scanning & service discovery using Masscan and Nmap. Scan large networks with Masscan and use Nmap's scripting abilities to discover information about services. Generate report.
Fast and customizable vulnerability scanner For JIRA written in Python
Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)
.NET Antivirus Evasion Tool (Exe2Bat)
Some tools to help mitigating Apache Log4j 2 CVE-2021-44228
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Second Order SQL injection using python
Second Order SQL injection using python
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.