Olajuwon Faleke's repositories
Flipper-Zero-BadUSB
Repository for my flipper zero badUSB payloads. Now almost entirely plug and play.
Auto_Tor_IP_changer
change your Ip address automatically This tool based on tor project
Block-Site
A browser extension to block website access using hostname matching
CTFd
CTFs as you need them
PowerShell-for-Hackers
This repository is a collection of powershell functions every hacker should know
sherlock
🔎 Hunt down social media accounts by username across social networks
Ubers-SD-Files
These are all of the SD card assets you need for your Flipper Zero!
MHDDoS
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
HowToHunt
Collection of methodology and test case for various web vulnerabilities.
Auto-GPT
An experimental open-source attempt to make GPT-4 fully autonomous.
hak5-submissions
This is a collection of my pentesting scripts I have come up with
ohmyzsh
🙃 A delightful community-driven (with 2,000+ contributors) framework for managing your zsh configuration. Includes 300+ optional plugins (rails, git, macOS, hub, docker, homebrew, node, php, python, etc), 140+ themes to spice up your morning, and an auto-update tool so that makes it easy to keep up with the latest updates from the community.
COMSM0049
Systems and Software Security
maskphish
Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
GodGenesis
A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
libc-database
Build a database of libc offsets to simplify exploitation
gef-legacy
Legacy version of GEF running for GDB+Python2
CryptoCat-Pwn-Binary_Exploitation
CTF chall write-ups, files, scripts etc (trying to be more organised LOL)
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
fud-backdoor
Create a fully undetectable backdoor with simple steps.
ssh_bruteforce_python
A basic SSH brute force tool in Python
pagodo
pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching
portscanner
A basic port scanner
password_sniffer
A simple network password sniffer
password_cracker
A simple password hash cracker
MAC_address_changer
A simple tool built to change the MAC address
Python-keylogger
A basic Python keylogger
Email-scrapper
A simple email web scrapper in Python