- ๐ฅท๐ป Offensive Security
- ๐ Pentester & Exploiting
Keen interest in Offensive Security && Red Teaming | Bug_Hunting and Pentester. ๐ฑ
Name: CappaX
Type: User
Company: @BloodHoundAD @GangstaCrew @Openwall @ProjectDiscovery
Bio: Offensivist | EWPTX | INESec x4 | CRTE | CAWASP | AdSec x5 | PenTest+ | CCSAS | CWEE | HTB x7 | OSEE | OffSec x9 | CPT | GXPN | CEH Master | LPT Master | CแดตPENT
Twitter: pxsceet
Blog: s.id/bloodhoundsub
Keen interest in Offensive Security && Red Teaming | Bug_Hunting and Pentester. ๐ฑ
For radio frequency research ( RF attack ) this script can cause severe damage to an individual's privacy ( trust-attack ) by enabling attackers to intercept, modify, or disrupt communication between wireless devices. Educational purposes only
( Cracking Authentication ) this software will help you to pentesting a services and attempts to exploit the authentication process. a weak credentials protocol would easily got compromised!. Active services ( trust attack ), next generation of .crackedauth would be able to perform a Kerberos attack ( hope ).
Given the increasing acceptance of online informations. This malware is often used to form botnets or enabling initial access for the Conti ransomware or Ryuk banking trojan. 7R0J4N is developed and operated by a sophisticated group of malicious cyber actors and has evolved into a highly modular, multi stage malware.
versatile tool for BloodHound, an attack research kit in my own version and modification
Cyclist app
GUI exploitation framework. It was developed with Python and with Qt framework, have multiples features for a post exploitation step. Most wild windows remote access
Seven Degrees of Domain Admin
Six Degrees of Domain Admin
Data and exploit collector for ๐๐๐๐ง๐ฅ๐๐ค๐ช๐ฃ๐ to ๐ฝ๐ก๐ค๐ค๐๐๐ค๐ช๐ฃ๐. This software will automatically determine what domain or directory the current user belongs to. ( BOF.NET )
Bruteforce framework for Facebook, Gmail, Instagram, Twitter, and Outlook. There is no limit when you're using your own dictionary passwords
Hook ( grab ) a frequency sessions, a bundle of customs firmware. A high intensity of the RF environment will also likely make this attack Perform the best actions, more easy to hit, and easy to modify
configurations and deprecated payloads
Game dev. CatJet was similar to flappy bird
directory structure attack
casual chatroom for host and clients
it's a CVE-2023-28252 ( patched ), but feel free to use it for check any outdated software or reseach
release Neo scripts into any hard-drive and watch that devices burn
it's a CVE-2022-3368 ( patched ), but feel free to use it for check any outdated software or reseach
Kerberos Attacks, obtaining passwords hashes. ๐๐ฟ๐ฎ๐ฐ๐ธ๐๐ฒ๐ฟ๐๐๐๐ ๐ฒ๐ฐ focuses on the acquisition of TGS, specifically those related to services operating under user accounts in Active Directory
Kerberoasting ( Kerberos Attacks ). From networks or Domain controller log perspective, since ๐๐ฟ๐ฎ๐ฐ๐๐ฒ๐ฟ๐๐น๐ถ๐๐ implements many parts of the normal Kerberos protocol, the main detection method involves the use of rc4_hmac in Kerberos exchanges.
it's a CVE-2023-28229 ( patched ), but feel free to use it for check any outdated software or reseach
Enhance swiss army knife, for penetration testing networks. Kerberos attack and passwords spraying
Three-headed Massachusetts dog ( Kerberos ). Cracking the system or router that provides a gateway for AD. Kerberos attack
remote access trojan, RAT tools for penetration testing on a devices, access real time with client devices after the malware hits the kernels. Trust attack
remote access control, this CRE or RAT is a cross platform for attacking Windows, Linux, OSX, and Android. Most deadly C2 sharp spike for exploitation framework written in Cpp and C
this is it, ๐๐ฟ๐ฎ๐ ๐๐ฅ๐ฎ๐ is here. In the forum we've promise to share the iOS source code attack ( IPA's ), but since this repo already published, we've would just kept it awhile, thank you for understanding.
abusive ( 7R0J4N ) remote access for any smartphones, most advance on android. crowdown is software that gives a person full control of a phone devices, remotely
list of CVE reports for ( CRTM, CRTE, OSCP, EWPTX, CISSP ). Vulnerability details, exploits, references, random modules, kerberos attacks, XSS-injections, full list of vulnerable products and CVSS score and vulnerability reports.
distributed denial-of-service ( crossbow botnet ), no access for online services
A declarative, efficient, and flexible JavaScript library for building user interfaces.
๐ Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. ๐๐๐
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google โค๏ธ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.