Git Product home page Git Product logo

jrccrj's Projects

trustvisualizer icon trustvisualizer

Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.

tunshell icon tunshell

Remote shell into ephemeral environments 🐚 🦀

turtle icon turtle

MSFVenom Powershell Stager Encoder & Generator

twitter-php icon twitter-php

Small and easy PHP library for sending messages to Twitter and receiving statuses.

twitteroauth icon twitteroauth

The most popular PHP library for use with the Twitter OAuth REST API.

uac-bypass icon uac-bypass

Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯

udemy-docker-mastery icon udemy-docker-mastery

Udemy Course to build, compose, deploy, and manage containers from local development to high-availability in the cloud

udork icon udork

uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or directories, find IoT devices, detect versions of web applications, and so on.

unambinder icon unambinder

A Free Silent (Hidden) Open-Source Native Binder - Includes Windows Defender Bypass - Unam Binder

unamdownloader icon unamdownloader

A Free Silent (Hidden) Open Source Downloader (Binder) - Includes Windows Defender Bypass - Build Native - Unam Downloader

unicorn icon unicorn

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.

uniqueid icon uniqueid

Calculate various interesting numbers and codes, including some US driver's license numbers

uplexa icon uplexa

uPlexa: Incentivizing the mass compute power of IoT devices to form a means of anonymous blockchain payments.

uplexa-gui icon uplexa-gui

uPlexa: Incentivizing the mass compute power of IoT devices to form a means of anonymous blockchain payments.

upx icon upx

UPX - the Ultimate Packer for eXecutables

urler icon urler

🔗 Generate Phishing URLs 🔗

usbtrojan icon usbtrojan

Super simple loader that spreads over removable drives (USB flash drives, portable and network drives, SD cards). Features: You can add the HWID of your PC to the whitelist and trojan will ignore it; You can add any payload (executable file); Slient work. Ideal for school, university or office.

vba-obfuscator icon vba-obfuscator

2018 School project - PoC of malware code obfuscation in Word macros

vba2graph icon vba2graph

Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.

vbad icon vbad

VBA Obfuscation Tools combined with an MS office document generator

venom icon venom

venom - C2 shellcode generator/compiler/handler

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.