Raimundo Jiménez's repositories
2of5-font
2of5
AndBug
Android Debugging Library
binary-auditing-training
Free IDA Pro Binary Auditing Training Material for University Lectures - from http://binary-auditing.com . Contains decrypted/unzipped files along with original zip archive and site's index.html
brutus
BRUTUS is an alternative, fast testing framework for CAESAR ciphers.
Clearcut
Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review
cscan
Faraday Continuous Scanning
csv
csv tool to manipulate csv files in stream mode
ctf-1
some tasks/solutions from CTF challenges
ctf-writeups
Write-Ups for CTF challenges
firesheep
A Firefox extension that demonstrates HTTP session hijacking attacks.
Intersect-2.5
Post-Exploitation Framework
IriusRisk
IriusRisk Community
kippo
Kippo - SSH Honeypot
magspoof
A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy.
named-entity-recognizer
A Named Entity Recognizer (NER) application in Java using the CRF++ tool and Conll2002 data sets.
NER
Named Entity Recognizer (NER) application in Java using the CRF++ tool and Conll2002 data sets
oscp-2
Repo containing scripts used for OSCP
PenBox
PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo
Pertinax
Integrating Sysinternals Autoruns’ logs into Security Onion
Privilege-Escalation
This contains common local exploits and enumeration scripts
shells
collection of useful shells for penetration tests
spdylay
The experimental SPDY protocol version 2, 3 and 3.1 implementation in C
ssh-vulnkey
stand-alone ssh-vulnkey implementation
Stegosip
TCP tunnel over RTP/SIP
usbdriveby
USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoor, and rerouting DNS within seconds of plugging it in.
username-anarchy
Username tools for penetration testing
Windows-Exploit-Suggester-2
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.