Code Monkey home page Code Monkey logo

stonedsour's Projects

airgeddon icon airgeddon

This is a multi-use bash script for Linux systems to audit wireless networks.

atear icon atear

Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration

byob icon byob

An open-source post-exploitation framework for students, researchers and developers.

crypto-webminer icon crypto-webminer

Use Crypto Webminer JavaScript miner on various Cryptonight | CN-Lite | CN-Fast | CN-Fast2 | CN-Pico | CN-RWZ | CN-UPX2 | CN-Half | CN-Heavy | CN-Saber (BitTube) | Argon2id - Chukwa Stratum Pools

cybercrack icon cybercrack

This tool is great for information gathering and post- exploitation

exploit-framework-v1.0 icon exploit-framework-v1.0

EXPLOIT-FRAMEWORK is a very powerfull hacking tool and have dangerous hacks like Payload Creator,DLL Exploit,Bluetooth Hacking,Wifi Hacking,Blackout Exploit,Android Hacking,Hack Cameras. AND DO NOT CLAIM OR FORK THIS SCRIPT IT IS COPYRIGHTED AND YOU WILL PAY FOR FORKING OR CLAIMING IT CHANGING THE CODE WILL ASO NOT YOU THE CODER #RESPECT ALL CODERS.

fruitywifi icon fruitywifi

FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq, NetHunter.

kali-anonsurf icon kali-anonsurf

A port of ParrotSec's stealth and anonsurf modules to Kali Linux

katoolin icon katoolin

Automatically install all Kali linux tools

nxcrypt icon nxcrypt

NXcrypt - 'python backdoor' framework

oscp-pwk icon oscp-pwk

This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.

pi-pwnbox-rogueap icon pi-pwnbox-rogueap

Homemade Pwnbox :rocket: / Rogue AP :satellite: based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap :bulb:

seclists icon seclists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

trackerjacker icon trackerjacker

Like nmap for mapping wifi networks you're not connected to, plus device tracking

wordlistpasswordgenerator icon wordlistpasswordgenerator

Python Wordlist Password Generator for Termux - Hack any fb, instagram, Wifi any Password list - Online Hacking

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.