Code Monkey home page Code Monkey logo

Ajayi smart's Projects

0x0p1n3r icon 0x0p1n3r

0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily

4nonimizer icon 4nonimizer

A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN)

adhrit icon adhrit

Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.

aggressorscripts icon aggressorscripts

Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources

anonym8 icon anonym8

Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and wipe (Cleans ram/cache & swap-space) features, ID spoofing has never been so easy.

aptnotes icon aptnotes

Various public documents, whitepapers and articles about APT campaigns

assessment-mindset icon assessment-mindset

Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.

attack-coverage icon attack-coverage

an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques

autopsy icon autopsy

Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.

aware icon aware

PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP

awesome-bugbounty-writeups icon awesome-bugbounty-writeups

A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference

awesome-pentest icon awesome-pentest

A collection of awesome penetration testing resources, tools and other shiny things

awesome-soar icon awesome-soar

A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.

awesome-vulnerable icon awesome-vulnerable

A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.

backdoors icon backdoors

Simple linux backdoors and hiding techniques

banks-db icon banks-db

Community driven database to get bank info (name, brand color etc.) by bankcard prefix (BIN)

beaconator icon beaconator

A beacon generator using Cobalt Strike and PEzor.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.