Code Monkey home page Code Monkey logo

h3llozy's Projects

across icon across

Across the Great Wall we can reach every corner in the world

adape-script icon adape-script

Active Directory Assessment and Privilege Escalation Script

adidnsdump icon adidnsdump

Active Directory Integrated DNS dumping by any authenticated user

android_trojan icon android_trojan

Android trojan with abilities of recording calls, live mic streaming , remote root commands execution and other

asnlookup icon asnlookup

Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.

azscanner icon azscanner

自动漏洞扫描器,自动子域名爆破,自动爬取注入,调用sqlmapapi检测注入,端口扫描,目录爆破,子网段服务探测及其端口扫描,常用框架漏洞检测。 Automatic scanner, automatic sub domain blasting, automatic crawl injection, injection, call the sqlmapapi port scan detection, directory service detection and segment blasting, port scanning, vulnerability detection framework commonly used.

blackeye icon blackeye

The most complete Phishing Tool, with 32 templates +1 customizable

cactustorch icon cactustorch

CACTUSTORCH: Payload Generation for Adversary Simulations

cintruder icon cintruder

Captcha Intruder (CIntruder) is an automatic pentesting tool to bypass captchas.

cred_scanner icon cred_scanner

A simple file-based scanner to look for potential AWS access and secret keys in files

cve-2018-20250 icon cve-2018-20250

exp for https://research.checkpoint.com/extracting-code-execution-from-winrar

cve-search icon cve-search

cve-search - a tool to perform local searches for known vulnerabilities

datasploit icon datasploit

An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.

decrypt_weblogic_password icon decrypt_weblogic_password

搜集了市面上绝大部分weblogic解密方式,整理了7种解密weblogic的方法及响应工具。

dirhunt icon dirhunt

Find web directories without bruteforce

dnslog icon dnslog

DNSLog 是一款监控 DNS 解析记录和 HTTP 访问记录的工具。

eaphammer icon eaphammer

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.