electr0lulz

electr0lulz

Geek Repo

Company:Lulz Oldschool

Location:Edmonton, Alberta (CA)

Github PK Tool:Github PK Tool

electr0lulz's repositories

madkatty

Katty's Mad [L7/L4 DDOS and TOOLS]

Language:PythonLicense:GPL-3.0Stargazers:29Issues:1Issues:2

Mass-exploit-CVE-2022-29464

Mass Exploit for CVE 2022-29464 on Carbon

Language:PythonLicense:GPL-3.0Stargazers:19Issues:2Issues:2

Mass-CVE-2022-1388

Mass-Exploit-CVE-2022-1388

Language:PythonLicense:GPL-3.0Stargazers:3Issues:1Issues:0

psqli-pro

Powerfull Automatic Sql injection Tools Pack

Language:ShellStargazers:1Issues:0Issues:0

cryptocasino

CryptoCasino Project

Stargazers:0Issues:0Issues:0
Language:JavaStargazers:0Issues:0Issues:0

EagleMonitorRAT

Remote Access Tool Written In C#

Language:C#License:AGPL-3.0Stargazers:0Issues:0Issues:0

electr0lulz

Config files for my GitHub profile.

Stargazers:0Issues:1Issues:0

EndGame

EndGame DDoS filter.

Language:LuaStargazers:0Issues:0Issues:0
Language:ElixirStargazers:0Issues:0Issues:0

Proton-Crypter

Proton Crypter

Language:Visual Basic .NETStargazers:0Issues:0Issues:0

ElixirCode

Reference Repo for an Elixir course on Udemy.com

Language:ElixirStargazers:0Issues:0Issues:0

JPGtoMalware

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.

Language:PythonLicense:NOASSERTIONStargazers:0Issues:0Issues:0

LFISuite

Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

LulzSec-Password-Analysis

top password from sonyleaks

Language:PythonStargazers:0Issues:0Issues:0

multitor

Create multiple TOR instances with a load-balancing.

Language:ShellLicense:GPL-3.0Stargazers:0Issues:0Issues:0

Obfuscator

The program is designed to obfuscate the shellcode.

Language:C#License:GPL-3.0Stargazers:0Issues:0Issues:0

Platypus

:hammer: A modern multiple reverse shell sessions manager written in go

Language:GoLicense:LGPL-3.0Stargazers:0Issues:0Issues:0

PwnKit

Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation

Language:CLicense:MITStargazers:0Issues:0Issues:0

PyRoxy

PyRoxy

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

SMBGhost

Scanner for CVE-2020-0796 - SMBv3 RCE

Language:PythonStargazers:0Issues:0Issues:0

SSHBastard

This tool scan CIDR range to search SSH servers, then start to bruteforce every single IP using a given wordlist

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

tor

https://gitlab.torproject.org/

Language:CLicense:NOASSERTIONStargazers:0Issues:0Issues:0

venom

venom - C2 shellcode generator/compiler/handler

Language:ShellStargazers:0Issues:0Issues:0