wangrunxiang / BubbleVIew
气泡控件 A bubble view like inke or other live application
☆1Updated 7 years ago
Related projects: ⓘ
- Three headed dog, Kerberos Attacks. Cracking the system or router that provides a gateway for Active Directory.☆17Updated 4 months ago
- Combining 'authentication' and 'grilling' to convey. Active directory ( trust attack ). performing an advance Kerberos attack may result …☆12Updated 3 months ago
- Automatic Injection attacks. Blind SQL, NoSQL, SQL, Blind GQL, GQL, Command, LDAP, Traversal, JNDI, JDBC, Esi, El, Etc. Clear mapping.☆30Updated 3 weeks ago
- configurations and deprecated payloads☆10Updated 2 months ago
- Versatile tool for BloodHound, an attack research kit in my own version and modification☆10Updated 4 months ago
- Release Neo, the Evil Ducky scripts into any Hardware or drive and watch that Devices burn.☆9Updated 2 months ago
- 𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability exploit called 'EternalBlue'. The US National Security A…☆38Updated 4 months ago
- P O I S O N I N G☆15Updated 2 months ago
- Kerberoasting ( Kerberos Attacks ). From networks or Domain controller log perspective, since 𝗖𝗿𝗮𝗰𝗞𝗲𝗿𝗕𝗹𝗶𝘁𝘇 implements many pa…☆23Updated 2 months ago
- ( Cracking Authentication ) this software will help you to pentesting a services and attempts to exploit the authentication process. a we…☆13Updated 2 months ago
- encrypting directory and access. If the attackers find a 'scripts' that execute the commands based on external inputs, they might exploit…☆10Updated 2 months ago
- Docker Payload ( Bypass anti virus ). Payload data at the endpoint when running NestJS application inside a Docker container.☆15Updated 2 months ago
- Kerberos Attacks, obtaining password hashes. 𝗖𝗿𝗮𝗰𝗸𝗠𝗼𝗽𝗘𝘅𝗲𝗰 focuses on the acquisition of TGS, specifically those related to se…☆30Updated last week
- Enhance swiss army knife, for penetration testing networks. Kerberos attacks and passwords spraying. Additionally, a database is used to …☆19Updated last week
- drawing "" C# "" Tool "" Windowsforms☆47Updated 7 months ago
- Hook ( grab ) a frequency sessions, a bundle of customs firmware. A high intensity of the RF environment will also likely make this attac…☆11Updated 2 months ago
- Fast, Simple and Secure. This is a DBMS for professionals and extreme loads.☆275Updated 3 weeks ago
- Abusive & Offensive ( 7R0J4N ) remote access for any smartphones, most advance on Android. crowdown is software that gives a person full …☆16Updated last month
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password c…☆34Updated 2 months ago
- Data and exploit collector for SharpHound to BloodHound. This software will automatically determine what domain or directory the current …☆75Updated last month
- offshore is the most brutal and advance host hunter, ready and steady for rubella ( 7R0J4N ) trojan infections to be spreaded. Bypass sev…☆16Updated 2 months ago
- Seven Degrees of Domain Admin☆55Updated this week
- Rootkit and Kernel attack kit, 𝗜𝘀𝗮𝗯𝗲𝗹𝗹𝗮 program will enables cyber attacks to gain access to and infiltrate data from machines wi…☆8Updated 2 months ago
- Perform a ( hard-core ) force attack to get the correct credentials in under one minute, with the help of 𝗧𝗲𝗲𝘁𝗵 cybertooth && 𝗝𝗼𝗵…☆50Updated 2 months ago
- Six Degrees of Domain Admin☆28Updated last week
- Github Profile Readme☆18Updated this week
- 💾 A Memory-based key-value storage system for JavaScript.☆326Updated last week
- ⚡ Enhance Next.js Beyond Limits☆244Updated this week
- This malware is often used to form Botnets, enabling initial access for the Cyber Attacks Ransomware or Ryuk banking Trojan. 7R0J4N is de…☆27Updated 4 months ago
- remote access trojan, RAT tools for penetration testing on a devices, access real time with client devices after the malware hits the ker…☆10Updated 2 months ago
- The checker/scraper of web solutions☆108Updated 4 months ago