Jsmoreira02
Eletronic geek, Ethical hacker and Programmer who ironically creates unethical things for fun!
Pinned Repositories
CatBinaries
Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques
Cronjob-Exploit
Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)
ForceCannon
"Force Cannon" is a brute force tool made in ruby, that performs attacks on login forms using the POST method without robust filters or protections.
Hazard
Hazard is a dictionary brute-force attack, constructed using the Rust language for the most sensitive network protocols and services, including FTP, SSH, PostgreSQL, MySQL, and Samba (SMB networking protocol). Its design prioritizes ease of use and a clean interface, making it suitable for use in Capture the Flag (CTF) or Pentest Services.
Keylogger-Evil_Server
POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker
KoopaShell
🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐢
Malicious_Plugin
Hacking WordPress Plugins - Authenticated Shell Upload, by compromising admin console and upload a malicious plugin with PHP (reverse shell code)
Mr_Hash
This is a tool designed for decryption, hash cracking and various other utilities to optimize your hacking or privilege escalation. It contains the most common types of ciphers/hashes used in pentest situations and CTF games. Good hacking!
Process_Injection
Injection of malicious code into legitimate Windows processes for evasion and simple malware to gain unauthorized access, using the Windows API. Serves as proof of concept or intrusion detection exercises.
sar2HTML_exploit
Exploit the Sar2HTML RCE vulnerability and also perform a Shell Upload on the target
Jsmoreira02's Repositories
Jsmoreira02/KoopaShell
🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐢
Jsmoreira02/Malicious_Plugin
Hacking WordPress Plugins - Authenticated Shell Upload, by compromising admin console and upload a malicious plugin with PHP (reverse shell code)
Jsmoreira02/Hazard
Hazard is a dictionary brute-force attack, constructed using the Rust language for the most sensitive network protocols and services, including FTP, SSH, PostgreSQL, MySQL, and Samba (SMB networking protocol). Its design prioritizes ease of use and a clean interface, making it suitable for use in Capture the Flag (CTF) or Pentest Services.
Jsmoreira02/Keylogger-Evil_Server
POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker
Jsmoreira02/CatBinaries
Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques
Jsmoreira02/Cronjob-Exploit
Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)
Jsmoreira02/ForceCannon
"Force Cannon" is a brute force tool made in ruby, that performs attacks on login forms using the POST method without robust filters or protections.
Jsmoreira02/Mr_Hash
This is a tool designed for decryption, hash cracking and various other utilities to optimize your hacking or privilege escalation. It contains the most common types of ciphers/hashes used in pentest situations and CTF games. Good hacking!
Jsmoreira02/sar2HTML_exploit
Exploit the Sar2HTML RCE vulnerability and also perform a Shell Upload on the target
Jsmoreira02/ShowMeThePorts
Simple Rust Port Scanner and Banner Grabber. Made for Investigation, scanning and enumeration of open ports on target machine for pentest recognition step
Jsmoreira02/Process_Injection
Injection of malicious code into legitimate Windows processes for evasion and simple malware to gain unauthorized access, using the Windows API. Serves as proof of concept or intrusion detection exercises.
Jsmoreira02/CVE-2014-6271
Exploitation of "Shellshock" Vulnerability. Remote code execution in Apache with mod_cgi
Jsmoreira02/Jsmoreira02
Jsmoreira02/LFI-Hunter
Automated tool to bypass filtering systems and exploit Local File Inclusion, created for Bug Bounty tests and better optimization during the hack (and with special attention to CTFs)
Jsmoreira02/jsmoreira02.github.io
Jsmoreira02/ptf-Pentest-Framework-
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
Jsmoreira02/Tempest
A command and control framework written in rust. (*HUGE! admiration for this project*)