Code Monkey home page Code Monkey logo

Hello!

Twitter/X

CappaX's Projects

.crackdown icon .crackdown

For radio frequency research ( RF attack ) this script can cause severe damage to an individual's privacy ( trust-attack ) by enabling attackers to intercept, modify, or disrupt communication between wireless devices. Educational purposes only

.crackedauth icon .crackedauth

( Cracking Authentication ) this software will help you to pentesting a services and attempts to exploit the authentication process. a weak credentials protocol would easily got compromised. Active services ( trust attack ), next generation of .crackedauth would be able to perform an attacks on Kerberos authentication.

7r0j4n icon 7r0j4n

This malware is often used to form Botnets, enabling initial access for the Cyber Attacks Ransomware or Ryuk banking Trojan. 7R0J4N is developed and operated by a sophisticated group of malicious Cyber Actors and has evolved into a highly modular, multi stage Backdoor..

bark icon bark

BloodHound Attack Research Kit, an Attack Kit in my own Version and Modification.

blackmamba icon blackmamba

GUI exploitation framework. It was developed with Python and with QT Framework, Have multiples features for a post exploitation step. Most wild Windows remote access

breedhoundad icon breedhoundad

Data and exploit collector for SharpHound to BloodHound. This software will automatically determine what domain or directory the current user belongs to. ( BOF.NET )

brutalhookexec icon brutalhookexec

Hook ( grab ) a frequency sessions, a bundle of customs firmware. A high intensity of the RF environment will also likely make this attack Perform the best actions, more easy to hit, and easy to modify

c2kepexec icon c2kepexec

C2 : Command and Control Server for the Trojan Backdoor, acting as Remote access tool. Trojan Execution

camhoundad icon camhoundad

Automated Exploit scanners for public Cameras, CCTV's, Devices Cam, Etc. Exploitation tool, Trust Attacks.

carpaalko icon carpaalko

Notorious Smartphones Malware family, known for its Remote Administration & Access Tools, which include remote Device control and advanced Spyware functions like keylogging, gesture Manipulation, and recording of Cameras, Screens, and Calls.

cartel icon cartel

configurations and deprecated payloads

clfs icon clfs

it's a CVE-2023-28252 ( patched ), but feel free to use it for check any outdated software or reseach

coreneoexec icon coreneoexec

Release Neo, the Evil Ducky scripts into any Hardware or drive and watch that Devices burn.

corphydra icon corphydra

Corporate Enterprise level of Penetration Tesing using Hydra, a CLI Software for Credentials and Logon Cracking. Updated version of the popular thc hydra by @vanhauser-thc

corporalkraken icon corporalkraken

Docker Payload ( Bypass anti virus ). Payload data at the endpoint when running NestJS application inside a Docker container.

crackavfee icon crackavfee

it's a CVE-2022-3368 ( patched ), but feel free to use it for check any outdated software or reseach

crackerblitz icon crackerblitz

Kerberoasting ( Kerberos Attacks ). From networks or Domain controller log perspective, since 𝗖𝗿𝗮𝗰𝗞𝗲𝗿𝗕𝗹𝗶𝘁𝘇 implements many parts of the normal Kerberos protocol, the main detection method involves the use of rc4_hmac in Kerberos exchanges.

crackkeyiso icon crackkeyiso

it's a CVE-2023-28229 ( patched ), but feel free to use it for check any outdated software or reseach

crackmacexpo icon crackmacexpo

The most advanced GUI frontend && CLI RAT for MacOS and OSX distro, Remote Access Tool. Penetrate the SSL and Security system of Unix with sharp IPA's malware, specialized for Apple. It can also retrieve iCloud Tokens, Contacts, and search engine Passwords History's.

crackmapexec icon crackmapexec

A swiss army Knife for PenTesting Networks and Active Directory. This project is no longer mantained due to the Original CrackMapExec

crackmapkeros icon crackmapkeros

Three headed dog, Kerberos Attacks. Cracking the system or router that provides a gateway for Active Directory.

crackmopexec icon crackmopexec

Kerberos Attacks, obtaining password hashes. 𝗖𝗿𝗮𝗰𝗸𝗠𝗼𝗽𝗘𝘅𝗲𝗰 focuses on the acquisition of TGS, specifically those related to services operating under user accounts in Active Directory.

crawlerexec icon crawlerexec

Remote access control, this RCA or RAT is a Cross platform for attacking Windows, Linux, OSX, and Android. Most deadly C2 sharp spike for exploitation framework written in C++ and C

crawler_v2 icon crawler_v2

remote access trojan, RAT tools for penetration testing on a devices, access real time with client devices after the malware hits the kernels. Trust attack

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.