Code Monkey home page Code Monkey logo

hudahadoh's Projects

antiadmin icon antiadmin

X-code Anti Admin adalah Program untuk untuk penghapusan jejak pada log di linux. Bisa digunakan dalam tahapan hacking ke 5 yaitu covering tracks. Untuk mengakses program ini wajib menggunakan akses root.

attack-51 icon attack-51

Attack 51%: Cryptocurrency Vulnerability Revealed

awesome-hacking icon awesome-hacking

A collection of various awesome lists for hackers, pentesters and security researchers

bitcoindigger icon bitcoindigger

Search for private keys to receive Bitcoins using own algorithm "Bloom filter".

blueducky icon blueducky

🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)

bot-telegram-aisyah_bukan_bot icon bot-telegram-aisyah_bukan_bot

Repo ini berisi implementasi CRUD dengan bot telegram (@Aisyah_Bukan_Bot) mempunyai layanan pribadi untuk mahasiswa dalam notifikasi data tugas keseharian

btc-recover-crypto-guide icon btc-recover-crypto-guide

BTCRecover is an open source wallet password and seed recovery tool. BTC Recover Crypto Guide wallet password and seed recovery tools open source

cryptodeeptools icon cryptodeeptools

Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin

defi-attacks icon defi-attacks

DeFi Attacks & Exploits all the biggest cryptocurrency thefts from 2021 to 2022

devmeet icon devmeet

Video Conferencing App with built in Compiler

faucetcryptobot icon faucetcryptobot

A bot for FaucetCrypto a cryptocurrency faucet. The bot can currently claim PTC ads, main reward and all the shortlinks except exe.io and fc.lc.

hackmkv icon hackmkv

HackMKV - Generate Malacious Video.MKV To Remotely Hack Computer Via Video Files.

hacktricks icon hacktricks

Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.

headshot icon headshot

Linux rootkit POC to hide a crypto miner's process and CPU usage.

injectapk icon injectapk

InjectAPK - Binding Android Payload Into APK and Remotely Hack Into Android Phone.

log4j-vulnerability icon log4j-vulnerability

Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string.

minerinthemiddle icon minerinthemiddle

This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cryptocurrency miners into the response payloads

moneroman icon moneroman

A launcher script which allows changing the CPU usage of a process when specific other processes are running.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.