Alex M. Espinosa's repositories
wp-backdoor
Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... Apart from reverse shells, of course, because I see some issues with the reverse shells stuff. That's why I posted this WordPress Backdoor.
python-hacking-tools
These are all the python tools and scripts I have crafted so far. I will be updating the repo as I code more or if any update needs to be made.
CTk-optionmenu-placeholder
This mod consists in a few lines of code added to the original widget to add a custom placeholder text to the CTk Option Menu widget.
fingerprinter
Fingerprinter is a simple Browser Fingerprinter built using HTML, CSS and JavaScript. I have based this project on FingerprintJS but adding some extra features out of the scope of browser fingerprinting as a PoC of how much data can be easily gathered from a client when visiting a website.
kioptrix1-walkthrough
Today we are hacking into a highly recommended beginner CTF called Kioptrix. I had some troubles installing the machine from VulnHub so, in case you face some errors, I am providing you the .OVA file for the vulnerable machine.
proxmark3-bulk-wrbl
Writing blocks with a Proxmark3 Easy can become an exhausting task when you need to write several blocks and the built-in function for restoring fails.
esp8266-wifi-deauther
Today we're doing something different. We will leave the computer for a while and make something with our hands. Let's make the Wi-Fi Deauther from Spacehuhn. Check his Github, it's awesome all the stuff he makes!
kioptrix2-walkthrough
Today I'm hacking into Kioptrix 1.1. Or Kioptrix #2. Whatever. This is one of the many beginner-friendly OSCP-like CTFs of Vulnhub. So it's a great starting point for preparing the OSCP tests.
ESP32Marauder-1
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
GC2
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive.
lord-of-the-root-walkthrough
As a LOTR fan I decided to start my CTF documentations by documenting the process of hacking this VulnHub Machine called Lord Of The Root.
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
red-team-book
This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
red-team-infrastructure
Wiki to collect Red Team infrastructure hardening resources
secure-network-for-ctf
The process is quite easy but it allows you to run VulnHub machines without any risks. This way you can be safe while you hack into vulnerable machines as these machines won't be connected to the Internet.
sheller
Sheller is a simple Online Reverse Shell Generator built using HTML, CSS and JavaScript. I have based this project on the amazing RevShells that supports way more languages and variants of all type of shells. I just wanted this project to be as simple as possible although Iโm thinking of adding more features.
tr0ll-walkthrough
Today we are hacking into Tr0ll - a boot-to-root vulnerable machine. It's not a hard machine to hack into but it's a good one to learn new stuff and let the previous knowledge sink in.