Code Monkey home page Code Monkey logo

nanogithub's Projects

4nonimizer icon 4nonimizer

A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN)

anubis icon anubis

Subdomain enumeration and information gathering tool

arduino_course icon arduino_course

Curso de introducción a la electrónica digital con Arduino y gammification

artoo icon artoo

Ruby framework for robotics, drones, and the Internet of Things (IoT)

asyrv icon asyrv

ASYRV es una aplicación escrita en PHP/MySQL, con Servicios Web mal desarrollados(SOAP/REST/XML), esperando ayudar a los entusiastas de la seguridad informática a comprender esta tecnología tan utilizada hoy en día por las Organizaciones.

awesome-hacking icon awesome-hacking

A collection of various awesome lists for hackers, pentesters and security researchers

blackeye icon blackeye

The most complete Phishing Tool, with 32 templates +1 customizable

bodgeit icon bodgeit

Automatically exported from code.google.com/p/bodgeit

brutal icon brutal

Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )

brutesploit icon brutesploit

BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p

brutexss icon brutexss

BruteXSS - Cross-Site Scripting Bruteforcer

cb-testing icon cb-testing

DARPA Cyber Grand Challenge Challenge Binary Testing tools

checkweb icon checkweb

Identificador de Seguridad Web para Pentester

chimay-red icon chimay-red

Working POC of Mikrotik exploit from Vault 7 CIA Leaks

cloudfail icon cloudfail

Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network

diskover icon diskover

File system crawler, disk space usage, file search engine and file system analytics powered by Elasticsearch

dracnmap icon dracnmap

Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.

dracos icon dracos

Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.