electr0lulz's repositories
Mass-exploit-CVE-2022-29464
Mass Exploit for CVE 2022-29464 on Carbon
Mass-CVE-2022-1388
Mass-Exploit-CVE-2022-1388
cryptocasino
CryptoCasino Project
EagleMonitorRAT
Remote Access Tool Written In C#
electr0lulz
Config files for my GitHub profile.
EndGame
EndGame DDoS filter.
Proton-Crypter
Proton Crypter
ElixirCode
Reference Repo for an Elixir course on Udemy.com
JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
LFISuite
Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
LulzSec-Password-Analysis
top password from sonyleaks
multitor
Create multiple TOR instances with a load-balancing.
Obfuscator
The program is designed to obfuscate the shellcode.
Platypus
:hammer: A modern multiple reverse shell sessions manager written in go
PwnKit
Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation
PyRoxy
PyRoxy
SMBGhost
Scanner for CVE-2020-0796 - SMBv3 RCE
SSHBastard
This tool scan CIDR range to search SSH servers, then start to bruteforce every single IP using a given wordlist
tor
https://gitlab.torproject.org/
venom
venom - C2 shellcode generator/compiler/handler