mohamed majid's repositories
awesome-flipperzero
🐬 A collection of awesome resources for the Flipper Zero device.
corona
Reverse engineering SARS-CoV-2
Email-Scraper
An email scraper tool has an email finder browser extension that extracts email addresses from a website, website, or social media platform.
evildll
Malicious DLL (Reverse Shell) generator for DLL Hijacking
Flash-CHIP
Ready to use Flash environment for the C.H.I.P Single Board Computer
Flipper
Playground (and dump) of stuff I make or modify for the Flipper Zero
gravity-sync
An easy way to synchronize the blocklist and local DNS configurations of multiple Pi-hole 5.x instances.
hak5
hak5 YouTube videos
Heimdall
An Application dashboard and launcher
keepalived
Keepalived
LaZagne
Credentials recovery project
manifest
Master exhibit manifest for the fcc-ea-mirror project.
openvpn-install
OpenVPN road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
pyrdp
RDP man-in-the-middle (mitm) and library for Python 3 with the ability to watch connections live or after the fact
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
sifter
Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the 'blue' vulnerabilities within microsft and if unpatched, exploit them. It uses tools like blackwidow and konan for webdir enumeration and attack surface mapping rapidly using ASM. * Because the first step, is enumeration *
SMBploit
Pentesting tool for SMB (Samba) protocol in Microsoft Windows
turner
An HTTP over TURN/STUN proxy
unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
wazuh
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
whitelist
A simple tool to add commonly white listed domains to your Pi-Hole setup.
WinPwn
Automation for internal Windows Penetrationtest / AD-Security
XSS-LOADER
Xss Payload Generator ~ Xss Scanner ~ Xss Dork Finder
YKEY_keylogger
This is a small framework for generate and listen to Keylogger malwares... And also the most effective and most useful feature about this Keylogger malwares is they don't communicate through email with the hackers. It uses a MYSQL databases to communicate. So you will not face to any email issues. Not only that but also using this framework you can have a log of your victims their mac addresses and also their key logs. You can connect back to a victims no matter what your routers dynamic public IP address is.
Zehef
Zehef is an osint tool to track emails