Code Monkey home page Code Monkey logo

h3y , 1'm 4l1r3z4

4 p3n37r4710n 73573r w17h 4 p45510n f0r 1d3n71fy1n6 4nd m1716471n6 vuln3r4b1l17135 1n n37w0rk5, 5y573m5, 4nd 1nfr457ruc7ur35.

  • 🔭 Working on covert beacons to model advance threat actors.

  • 🌱 Researching on c2 channels; API Security; L2,L3 Pivoting.

  • ❓ Ask me about anything related to Infrastructure and cloud pentesting.

  • ⚡ Fun fact: There is no spoon!


My Skill Set

XAMPP Azure Linux MongoDB Nginx Python PostgreSQL Raspberry Pi Bash PowerShell MySQL Oracle GraphQL AWS Terraform Arduino

Connect with me


Github Stats


Recent Blog Posts





Alireza Tavakoli's Projects

powerhub icon powerhub

A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting

proxmark3 icon proxmark3

RRG / Iceman repo - Proxmark3 / Proxmark / RFID / NFC

pwnat icon pwnat

The only tool and technique to punch holes through firewalls/NATs where both clients and server can be behind separate NATs without any 3rd party involvement. Pwnat uses a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, router administrative requirements, STUN/TURN/UPnP/ICE, or sp

samytools icon samytools

Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle piping. Mostly *nix tools with an emphasis on macOS.

sipvicious icon sipvicious

SIPVicious OSS has been around since 2007 and is actively updated to help security teams, QA and developers test SIP-based VoIP systems and applications. This toolset is useful in simulating VoIP hacking attacks against phone systems especially through identification, scanning, extension enumeration and password cracking.

snmpwn icon snmpwn

An SNMPv3 User Enumerator and Attack tool

spoofy icon spoofy

Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.

sprayingtoolkit icon sprayingtoolkit

Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient

tokentacticsv2 icon tokentacticsv2

A fork of the great TokenTactics with support for CAE and token endpoint v2

webscan icon webscan

Browser-based network scanner & local-IP detection

wps icon wps

The whole collection of Exploits developed by me (Hacker5preme)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.