João Pedro Moreira's repositories

KoopaShell

🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐢

Language:RustLicense:NOASSERTIONStargazers:12Issues:0Issues:0

Malicious_Plugin

Hacking WordPress Plugins - Authenticated Shell Upload, by compromising admin console and upload a malicious plugin with PHP (reverse shell code)

Language:PythonLicense:GPL-2.0Stargazers:12Issues:1Issues:0

Hazard

Hazard is a dictionary brute-force attack, constructed using the Rust language for the most sensitive network protocols and services, including FTP, SSH, PostgreSQL, MySQL, and Samba (SMB networking protocol). Its design prioritizes ease of use and a clean interface, making it suitable for use in Capture the Flag (CTF) or Pentest Services.

Language:RustLicense:MITStargazers:10Issues:1Issues:0

Keylogger-Evil_Server

POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker

Language:PythonLicense:MITStargazers:5Issues:0Issues:0

CatBinaries

Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques

Language:ShellLicense:GPL-2.0Stargazers:4Issues:0Issues:0

Cronjob-Exploit

Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)

Language:ShellLicense:MITStargazers:3Issues:2Issues:0

Mr_Hash

This is a tool designed for decryption, hash cracking and various other utilities to optimize your hacking or privilege escalation. It contains the most common types of ciphers/hashes used in pentest situations and CTF games. Good hacking!

Language:PythonLicense:MITStargazers:3Issues:1Issues:0

sar2HTML_exploit

Exploit the Sar2HTML RCE vulnerability and also perform a Shell Upload on the target

Language:PythonLicense:MITStargazers:3Issues:1Issues:0

ForceCannon

"Force Cannon" is a brute force tool made in ruby, that performs attacks on login forms using the POST method without robust filters or protections.

Language:RubyStargazers:2Issues:1Issues:0

ShowMeThePorts

Simple Rust Port Scanner and Banner Grabber. Made for Investigation, scanning and enumeration of open ports on target machine for pentest recognition step

Language:RustLicense:MITStargazers:2Issues:2Issues:0

Process_Injection

Injection of malicious code into legitimate Windows processes for evasion and simple malware to gain unauthorized access, using the Windows API. Serves as proof of concept or intrusion detection exercises.

Language:C++Stargazers:1Issues:1Issues:0

CVE-2014-6271

Exploitation of "Shellshock" Vulnerability. Remote code execution in Apache with mod_cgi

Language:PythonStargazers:0Issues:1Issues:0
Stargazers:0Issues:1Issues:0

LFI-Hunter

Automated tool to bypass filtering systems and exploit Local File Inclusion, created for Bug Bounty tests and better optimization during the hack (and with special attention to CTFs)

Language:PythonLicense:GPL-2.0Stargazers:0Issues:2Issues:0
Language:HTMLLicense:MITStargazers:0Issues:0Issues:0

ptf-Pentest-Framework-

The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.

Stargazers:0Issues:0Issues:0

Tempest

A command and control framework written in rust. (*HUGE! admiration for this project*)

Language:RustLicense:MITStargazers:0Issues:0Issues:0