Skip to content
Block or report user

Report or block megamindAT

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
Pro

B Vulnerabilities Seeker

C 1 Updated Jun 12, 2018

TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root servers.

Python 441 49 Updated Jan 12, 2019

SSHPry v2 - Spy & Control os SSH Connected client's TTY

Python 161 14 Updated Oct 12, 2017

open source DDoS Amplification Tool with scanners.

Python 22 18 Updated Jun 1, 2017

Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)

C 679 161 Updated Apr 8, 2019

Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature

1,459 463 Updated Apr 21, 2019

POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.

46 21 Updated May 7, 2018

PHP Webshell with handy features

CSS 1,621 622 Updated Jun 6, 2018

Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit for ethical hackers. we begin with delivery methods, anti-vir…

C# 24 15 Updated Dec 14, 2018

(windows) post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass etc..

C++ 118 33 Updated Mar 1, 2019

Lilith, The Open Source C++ Remote Administration Tool (RAT)

C++ 320 99 Updated Apr 18, 2019

Remote root exploit for the SAMBA CVE-2017-7494 vulnerability

Python 172 61 Updated Nov 27, 2017

SambaCry exploit and vulnerable container (CVE-2017-7494)

C 204 71 Updated Oct 31, 2017

Zero-Day Code Injection and Persistence Technique

C 932 350 Updated Mar 28, 2017

Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a …

Python 283 120 Updated Sep 10, 2018

This is a framework based on fingerprint action, this tool is used for get information on a website or a enterprise target with multiple modules (Viadeo search,Linkedin search, Reverse email whois,…

Python 316 106 Updated Aug 28, 2018

CMS/LMS/Library etc Versions Fingerprinter

Ruby 163 29 Updated May 4, 2019

This is the list of all rootkits found so far on github and other sites.

507 230 Updated Oct 25, 2017

AWS Auditing & Hardening Tool

Shell 542 65 Updated Jun 7, 2018

DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.

Python 127 52 Updated Oct 20, 2018

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 5,244 1,957 Updated Apr 27, 2019

A collection of PowerShell Modules for BloodHound/Empire Orchestration

PowerShell 92 25 Updated Sep 26, 2017

The cheat sheet about Java Deserialization vulnerabilities

1,165 282 Updated May 2, 2019

Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.

Python 154 73 Updated Dec 13, 2017

RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.

Python 224 90 Updated Oct 31, 2017

An iOS kernel exploit designated to work on all iOS devices <= 10.3.1

Objective-C 312 114 Updated Aug 31, 2017

My proof-of-concept exploits for the Linux kernel

C 955 294 Updated Aug 9, 2018

A tool to dump the login password from the current linux user

C 2,375 476 Updated Jul 12, 2018

Linux privilege escalation auditing tool

Shell 1,117 275 Updated Apr 29, 2019
Next
You can’t perform that action at this time.