Code Monkey home page Code Monkey logo

cbk914's Projects

dongtai icon dongtai

DongTai is an interactive application security testing(IAST) product that supports the detection of OWASP WEB TOP 10 vulnerabilities, multi-request related vulnerabilities (including logic vulnerabilities, unauthorized access vulnerabilities, etc.), third-party component vulnerabilities, etc.

dr_robot icon dr_robot

This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Intelligence) tools.

dradisburp icon dradisburp

Burp Suite extension to connect and manage data from Dradis

ebowla icon ebowla

Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)

elpscrk icon elpscrk

An Intelligent common user-password profiler based on permutations and statistics, that's named after the same tool in Mr.Robot series S01E01

email2phonenumber icon email2phonenumber

A OSINT tool to obtain a target's phone number just by having his email address

emba icon emba

emba - An analyzer for Linux-based firmware of embedded devices.

epss-calculator icon epss-calculator

Burp Extension for Exploit Prediction Scoring System calculation of CVE vulnerabilities

epssnvd icon epssnvd

Exploit Prediction Scoring System (EPSS) Data Enrichment

esp32marauder icon esp32marauder

A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32

ethminer_fpga icon ethminer_fpga

A fork of Ethereum miner with OpenCL-based FPGA mining support (currently Intel FPGAs).

evil-winrm icon evil-winrm

The ultimate WinRM shell for hacking/pentesting

exegol icon exegol

Exegol is a kali light base with a few useful additional tools and some basic configuration

exphub icon exphub

Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340

exploits-predict icon exploits-predict

Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)

fake-sms icon fake-sms

A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy.

fastbook icon fastbook

The fastai book, published as Jupyter Notebooks

fcl icon fcl

FCL (Fileless Command Lines) - Known command lines of fileless malicious executions

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.