Skip to content

"Matrix-console" is a CLI program that simulates SQL injection, downloading resources from random URLs, and CPU component scanning, using random elements to create a more realistic simulation.

License

Notifications You must be signed in to change notification settings

INeddHelp/Matrix-console

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Matrix-console

The "matrix-console" project is a command-line interface (CLI) program that simulates various hacking and tech-related activities. The program offers three different modes of operation: SQL injection, download links, and CPU component scanning.

In the SQL injection mode, the program simulates a SQL injection attack by displaying a progress bar while "compiling" the attack.

picture 1

In the download links mode, the program simulates downloading resources from random URLs on GitHub.

picture 2

Finally, in the CPU component scanning mode, the program simulates scanning a computer's hard drives for components and displays the progress of the scan.

picture 3

The program uses various random elements, such as random delays and randomly generated URLs and device storage sizes, to create a more realistic simulation of the activities it is simulating.

Overall, the "matrix-console" project is a fun and engaging way to experience some of the activities that are often depicted in movies and TV shows about hacking and cybersecurity.

Installation and Usage

Installation

Execute this command in the terminal:

git clone https://github.com/INeddHelp/Matrix-console.git

Usage

On Windows

Open the terminal and type:

cd dist/
main

On Linux

Open the terminal and type:

cd dist/
chmox +x main
./main
cd ..

On macOS

chmod +x dist/main
sh dist/main

Contribution

If you want to contribute to this project, feel free to make a pull-request

License

This project is under MIT License

About

"Matrix-console" is a CLI program that simulates SQL injection, downloading resources from random URLs, and CPU component scanning, using random elements to create a more realistic simulation.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published