Code Monkey home page Code Monkey logo
  • ๐Ÿค™๐Ÿพ Aloha, Iโ€™m @danyocummings
  • ๐Ÿ“ Honolulu, HI
  • ๐Ÿ“š Information Security
  • ๐ŸŽต Music is my passion
  • ๐ŸŽฎ Gaming is my therapy
  • ๐Ÿ’ป Learning is my obsession
  • ๐Ÿ‘€ Interested in Digital Forensics and Penetration Testing

Danyo Cummings's Projects

pbomb icon pbomb

This Is The First Bomber By HACK3RY2J

pdfcrack icon pdfcrack

An Advanced tool to Crack Any Password Protected PDF file. A very user friendly script especially for noob hackers.

pentest-handbook icon pentest-handbook

This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it batter.

pentol icon pentol

PENTOL - Pentester Toolkit for Fiddler2

photon icon photon

Incredibly fast crawler designed for OSINT.

pimeyes-crack-userstyle icon pimeyes-crack-userstyle

This "Crack" is simply a couple of css styles that improve your experience while using the face-recognition service "pimeyes.com"

pwnedornot icon pwnedornot

OSINT Tool for Finding Passwords of Compromised Email Addresses

python icon python

All Algorithms implemented in Python

raccoon icon raccoon

A high performance offensive security tool for reconnaissance and vulnerability scanning

recsech icon recsech

Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .

ruler icon ruler

A tool to abuse Exchange services

scapy icon scapy

Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.

scilla-osint-tool icon scilla-osint-tool

Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration

seclists icon seclists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

seeker icon seeker

Accurately Locate Smartphones using Social Engineering

sherlock icon sherlock

๐Ÿ”Ž Hunt down social media accounts by username across social networks

slipstream icon slipstream

NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victimโ€™s NAT/firewall, just by the victim visiting a website

sn1per icon sn1per

Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty

social-analyzer icon social-analyzer

API, CLI & Web App for analyzing & finding a person's profile across +900 social media \ websites (Detections are updated regularly)

socialbox-termux icon socialbox-termux

SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By init__0 for termux on android

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.