Giter VIP home page Giter VIP logo

Jermain La Force's Projects

tornado-1 icon tornado-1

Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.

toxssin icon toxssin

An XSS exploitation command-line interface and payload generator.

tpotce icon tpotce

🍯 T-Pot - The All In One Honeypot Platform 🐝

tracgram icon tracgram

Use Instagram location features to track an account

trackerjacker icon trackerjacker

Like nmap for mapping wifi networks you're not connected to, plus device tracking

trevorc2 icon trevorc2

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

triplecross icon triplecross

A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.

trishul icon trishul

Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vulnerabilities and teach how to exploit them.

trustjack icon trustjack

Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows

tunna icon tunna

Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.

tuya-convert icon tuya-convert

A collection of scripts to flash Tuya IoT devices to alternative firmwares

uecg icon uecg

uECG - very small wearable ECG device that sends raw and processed data over BLE

uhoh365 icon uhoh365

A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is unthrottled, and is incredibly useful for social engineering assessments to find which emails exist and which don't.

undefender icon undefender

Killing your preferred antimalware by abusing native symbolic links and NT paths.

underhanded icon underhanded

Tool to check if an app is installed on the target device through a link

unicorn icon unicorn

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.

unoriginal-rice-patty icon unoriginal-rice-patty

"Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles

updog icon updog

Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.