javarockstar Goto Github PK
Name: HackingVision
Type: User
Company: HackingVision
Bio: Hacking Blog www.hackingvision.com Ethical Hacking Tutorials, Hacking News.
Twitter: TheDigitalAge1
Location: United Kingdom
Blog: www.hackingvision.com
Name: HackingVision
Type: User
Company: HackingVision
Bio: Hacking Blog www.hackingvision.com Ethical Hacking Tutorials, Hacking News.
Twitter: TheDigitalAge1
Location: United Kingdom
Blog: www.hackingvision.com
Simple Bash Rasomware for use in Cyber Exercises
Simple obfuscator for batch script
A complete, modular, portable and easily extensible MITM framework.
BinGoo! A Linux bash based Bing and Google Dorking Tool
Windows memory hacking library
A blind SQL injection module that uses bitshfting to calculate characters.
python blindSqli tool
A cloud based remote android managment suite, powered by NodeJS
botnet SSH Client manager
A network analysis algorithm for detecting bots on large networks.
Botnet research papers
A static analysis security vulnerability scanner for Ruby on Rails applications
A simple demo of phishing by abusing the browser autofill feature
Fileless web browser information extraction
Brute-force (dictionary attack, jk) attack that supports multiple protocols and services
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
Cameradar hacks its way into RTSP videosurveillance cameras
ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc)
Drag and Drop ClickJacking exploit development assistance tool.
ClamAV Unofficial Signatures Updater maintained by eXtremeSHOK.com
Detects clickbait headlines using deep learning.
A simple JavaScript library for click-jacking protection.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search engines to search domain information: Shodan, Censys and Zoomeye.
Cobalt wipe is the non-commercial version of Cobalt-Strike 4.3 (May 2021 Release)
Listed below are some extra phishing scenarios for wifiphisher these scenarios are only added to provide security awareness. It may not be legal in your country to use these scripts please read disclaimer before attempting to download any content from this page. Be responsible with these scenarios !. They are intended to be tested on your own network, and only your own network or networks & clients you have permission to test these phishing scenarios on.
A very simple Linux kernel module that hijacks the system call table and tampers with code being read by compilers.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.