Skip to content
View Jsmoreira02's full-sized avatar
🤖
Working with cybersecurity
🤖
Working with cybersecurity

Block or report Jsmoreira02

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Jsmoreira02/README.md
💻 Other Projects:

sar2HTML Exploit -> Exploit the Sar2HTML RCE vulnerability and also perform a Shell Upload on the target.

Force Cannon -> brute force tool. Attack on login forms using the POST method without robust filters or protections

Show Me The Ports -> Scanning and enumeration of open ports on target machine for pentest recognition step.

Mr Hash -> Decryption, hash cracking and various other utilities to optimize your hacking or privilege escalation.

CronJob Exploit -> Privilege escalation using an writable file that will be executed by a privileged user in a Cron task.

Windows Malware | Process Injection -> Injection of malicious code into legitimate Windows processes and simple malware

LFI Hunter -> Automated tool to bypass filtering systems and exploit Local File Inclusion

Pinned Loading

  1. Malicious_Plugin Malicious_Plugin Public

    Hacking WordPress Plugins - Authenticated Shell Upload, by compromising admin console and upload a malicious plugin with PHP (reverse shell code)

    Python 13 2

  2. KoopaShell KoopaShell Public

    🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐢

    Rust 13

  3. Hazard Hazard Public

    Hazard is a dictionary brute-force attack, constructed using the Rust language for the most sensitive network protocols and services, including FTP, SSH, PostgreSQL, MySQL, and Samba (SMB networkin…

    Rust 10 3

  4. Keylogger-Evil_Server Keylogger-Evil_Server Public

    POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker

    Python 6 4

  5. CVE-2014-6271 CVE-2014-6271 Public

    Exploitation of "Shellshock" Vulnerability. Remote code execution in Apache with mod_cgi

    Python

  6. CatBinaries CatBinaries Public

    Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques

    Shell 4 2