FDlucifer / FDlucifer.github.io
My personal tech blog
☆15Updated 2 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for FDlucifer.github.io
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+☆26Updated 6 months ago
- Working exploit code for CVE-2019-17625☆17Updated 4 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- The best way to send emails in Go.☆10Updated 3 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- 🔅 Reverse shell written on python3☆16Updated 3 years ago
- Files related to my training classes☆15Updated 3 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 5 months ago
- Asynchronous MSF RPC API wrapper☆20Updated last year
- Magento Security Scanner☆15Updated 2 years ago
- Shellcode / Buffer Overflow 💣☆18Updated 4 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆19Updated 4 years ago
- ☆8Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- ☆16Updated 6 years ago