mohamed majid (mohamedmajid91)

mohamedmajid91

Geek Repo

Location:iraq

Github PK Tool:Github PK Tool

mohamed majid's repositories

awesome-flipperzero

🐬 A collection of awesome resources for the Flipper Zero device.

License:CC0-1.0Stargazers:0Issues:0Issues:0

Brida

The new bridge between Burp Suite and Frida!

Language:JavaLicense:MITStargazers:0Issues:1Issues:0
Language:ShellStargazers:0Issues:1Issues:0

corona

Reverse engineering SARS-CoV-2

Stargazers:0Issues:0Issues:0

Email-Scraper

An email scraper tool has an email finder browser extension that extracts email addresses from a website, website, or social media platform.

Stargazers:0Issues:0Issues:0

evildll

Malicious DLL (Reverse Shell) generator for DLL Hijacking

License:NOASSERTIONStargazers:0Issues:0Issues:0

Flash-CHIP

Ready to use Flash environment for the C.H.I.P Single Board Computer

Language:ShellLicense:NOASSERTIONStargazers:0Issues:0Issues:0

Flipper

Playground (and dump) of stuff I make or modify for the Flipper Zero

License:MITStargazers:0Issues:0Issues:0

gravity-sync

An easy way to synchronize the blocklist and local DNS configurations of multiple Pi-hole 5.x instances.

License:GPL-3.0Stargazers:0Issues:0Issues:0

hak5

hak5 YouTube videos

License:MITStargazers:0Issues:0Issues:0

Heimdall

An Application dashboard and launcher

Language:PHPLicense:MITStargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

Katana

A Python Tool For google Hacking

Language:PythonLicense:MITStargazers:0Issues:1Issues:0

keepalived

Keepalived

License:GPL-2.0Stargazers:0Issues:0Issues:0

LaZagne

Credentials recovery project

License:LGPL-3.0Stargazers:0Issues:0Issues:0

manifest

Master exhibit manifest for the fcc-ea-mirror project.

Stargazers:0Issues:0Issues:0

openvpn-install

OpenVPN road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora

License:MITStargazers:0Issues:0Issues:0

pyrdp

RDP man-in-the-middle (mitm) and library for Python 3 with the ability to watch connections live or after the fact

License:GPL-3.0Stargazers:0Issues:0Issues:0

Reconnoitre

A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.

License:GPL-3.0Stargazers:0Issues:0Issues:0
License:MITStargazers:0Issues:0Issues:0

sifter

Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the 'blue' vulnerabilities within microsft and if unpatched, exploit them. It uses tools like blackwidow and konan for webdir enumeration and attack surface mapping rapidly using ASM. * Because the first step, is enumeration *

Stargazers:0Issues:0Issues:0

SMBploit

Pentesting tool for SMB (Samba) protocol in Microsoft Windows

Stargazers:0Issues:0Issues:0

turner

An HTTP over TURN/STUN proxy

Language:GoLicense:MITStargazers:0Issues:0Issues:0

unicorn

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.

License:NOASSERTIONStargazers:0Issues:0Issues:0

wazuh

Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

License:NOASSERTIONStargazers:0Issues:0Issues:0

whitelist

A simple tool to add commonly white listed domains to your Pi-Hole setup.

License:MITStargazers:0Issues:0Issues:0

WinPwn

Automation for internal Windows Penetrationtest / AD-Security

Language:PowerShellLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

XSS-LOADER

Xss Payload Generator ~ Xss Scanner ~ Xss Dork Finder

License:CC0-1.0Stargazers:0Issues:0Issues:0

YKEY_keylogger

This is a small framework for generate and listen to Keylogger malwares... And also the most effective and most useful feature about this Keylogger malwares is they don't communicate through email with the hackers. It uses a MYSQL databases to communicate. So you will not face to any email issues. Not only that but also using this framework you can have a log of your victims their mac addresses and also their key logs. You can connect back to a victims no matter what your routers dynamic public IP address is.

Language:PythonStargazers:0Issues:1Issues:0

Zehef

Zehef is an osint tool to track emails

License:GPL-3.0Stargazers:0Issues:0Issues:0