Code Monkey home page Code Monkey logo

Abraham's Projects

goproxy icon goproxy

Proxy is a high performance HTTP(S), websocket,TCP, UDP,Secure DNS,Socks5 proxy server .Chain-style proxies,nat forwarding in different lan,TCP/UDP port forwarding, SSH forwarding ,ipv4 and ipv6 supporting .Proxy是golang实现的高性能http,https,websocket,tcp,防污染DNS,socks5代理服务器,支持内网穿透,链式代理,通讯加密,智能HTTP,SOCKS5代理,前置CDN,域名黑白名单,跨平台,KCP协议支持,支持ipv4和ipv6,集成外部API。

gtrs icon gtrs

GTRS - Google Translator Reverse Shell

hackerexploit icon hackerexploit

this tool only for educational purpose . Disclaimer: We are no responsibility any action . if you want you use for educational purpose follow the step : apt-get install git git clone https://github.com/wh-hackerexploit/hackerexploit.git cd hackerexploit chmod 777 * ./hackexploit.sh Requirements pkg metasploit touch apktool _________________________________________ and by defult automacit install other pkg this tool create by { White-Hat (Hack Exploit) }

hackerexploit-v2 icon hackerexploit-v2

Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.

hcrypt icon hcrypt

Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD

hf-php icon hf-php

An open source .NET API wrapper for HackForums. Ported from HF-Sharp.

hidden-tear-2.0 icon hidden-tear-2.0

Hidden tear 2.0 with more extension and now it can crypt directory like Documents, Download, Pictures etc.

hiddendesktopviewer icon hiddendesktopviewer

This tool reveals hidden desktops and investigate processes/threads utilizing hidden desktops

hiddeneye icon hiddeneye

Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]

hollows_hunter icon hollows_hunter

Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).

how_to_get_emails_imap_tutorial icon how_to_get_emails_imap_tutorial

How to get emails including there attachments and how to extract various attributes from those emails. See https://youtu.be/zFEEGkvo6O8 for a more detailed information.

hvnc icon hvnc

Poor man's HyperV netcat

hvnc-2 icon hvnc-2

HVNC Client & Server | Coded in C++ (Fixed Tinynuke)

hvnc-3 icon hvnc-3

基于Tinynuke修复得到的HVNC

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.