Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

Projects in Awesome Lists by screetsec

A curated list of projects in awesome lists by screetsec .

https://github.com/screetsec/thefatrat

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .

accessibility antivirus autorun backdoor bypass bypass-av bypassantivirus dracos hacking kali-linux linux malware metasploit-framework msfvenom rat remote remote-access thefatrat tool trojan

Last synced: 01 Aug 2024

https://github.com/screetsec/TheFatRat

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .

accessibility antivirus autorun backdoor bypass bypass-av bypassantivirus dracos hacking kali-linux linux malware metasploit-framework msfvenom rat remote remote-access thefatrat tool trojan

Last synced: 31 Jul 2024

https://github.com/Screetsec/TheFatRat

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .

accessibility antivirus autorun backdoor bypass bypass-av bypassantivirus dracos hacking kali-linux linux malware metasploit-framework msfvenom rat remote remote-access thefatrat tool trojan

Last synced: 31 Jul 2024

https://github.com/screetsec/sudomy

Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting

bash bugbounty bugcrowd collected-subdomains enumeration framework hackerone httprobe kali kali-linux pentesting recon-subdomain reconnaissance scanner subdomain-enumeration subdomain-finder subdomain-scanner subfinder sublist3r

Last synced: 01 Aug 2024

https://github.com/screetsec/Dracnmap

Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.

backbox hacker hacking information-gathering kalilinux linux nmap nmap-command parrot scanning tool toolshacking

Last synced: 01 Aug 2024

https://github.com/Screetsec/Dracnmap

Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.

backbox hacker hacking information-gathering kalilinux linux nmap nmap-command parrot scanning tool toolshacking

Last synced: 31 Jul 2024

https://github.com/screetsec/brutal

Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )

arduino arduino-library badusb hacker hacking payload penetration penetration-testing powershell-attack rubberducky teensy usb

Last synced: 01 Aug 2024

https://github.com/Screetsec/Brutal

Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )

arduino arduino-library badusb hacker hacking payload penetration penetration-testing powershell-attack rubberducky teensy usb

Last synced: 31 Jul 2024

https://github.com/screetsec/brutesploit

BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p

automation backtrack bruteforce ctf hacker hacking kalilinux manipulation transform translation wordlist

Last synced: 01 Aug 2024

https://github.com/Screetsec/Vegile

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

backdoor ghost indonesia infinite-scroll inject linux metasploit msfvenom post-exploitation postgresql rootkit unlimited

Last synced: 31 Jul 2024

https://github.com/screetsec/vegile

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

backdoor ghost indonesia infinite-scroll inject linux metasploit msfvenom post-exploitation postgresql rootkit unlimited

Last synced: 01 Aug 2024

https://github.com/screetsec/Vegile

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

backdoor ghost indonesia infinite-scroll inject linux metasploit msfvenom post-exploitation postgresql rootkit unlimited

Last synced: 06 Aug 2024

https://github.com/Screetsec/LALIN

this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , install another and update to new #actually for lazy people hahaha #and Lalin is remake the lazykali with fixed bugs , added new features and uptodate tools . It's compatible with the latest release of Kali (Rolling)

Last synced: 31 Jul 2024

https://github.com/Screetsec/Cybersecurity-Indonesia

Kumpulan Course Video pembalajaran tentang Cyber Security & Hacking secara GRATIS, repositori ini akan membantu kita dalam proses pembelajaran untuk menjadi seorang IT Security, Pentester, Security Engineer, Security Operation Center dan masih banyak lagi yang di dalam ruang lingkup Information Security. Jika ingin berkontribusi ke repository ini, silahkan tekan tombol "Pull request".

Last synced: 01 Aug 2024

https://github.com/screetsec/wordlist-dracos

Collection My Wordlist

wordlist

Last synced: 03 Aug 2024