Pinned Repositories
AhMyth-Android-RAT
Android Remote Administration Tool
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
awesome-hacking
Awesome hacking is an awesome collection of hacking tools.
Awesome-Terminal-Commands
An awesome resource listing and explaining various commonly used *nix commands
BinDrill
Binary Driller (BD) is a visualization tool which uses the data produced from the Troglodyte tool developed on the Deep Learning Malware project. Binary Driller performs function matching using the provided function embeddings (function representations), then displays the matches for each function in a layout that mimics the location of each functi
botnets
This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
CardScan4Linux
Use this script to search through locally stored files for any Credit/Debit card details.
CyberSecurity-Box
Firewall-System based on OpenWRT or Pi-Hole with UnBound, TOR, optional Privoxy, opt. ntopng and opt. Configuration of the AVM FRITZ!Box with Presets for Security and Port-List. Please visit:
DaRT
The purpose of this code is to disassemble potentially malicious code into benign pieces that can safely be transported via any number of traditional methods without fear of infection.
DeepFaceLab
DeepFaceLab is the leading software for creating deepfakes.
MediumDragon's Repositories
MediumDragon/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
MediumDragon/awesome-hacking
Awesome hacking is an awesome collection of hacking tools.
MediumDragon/BinDrill
Binary Driller (BD) is a visualization tool which uses the data produced from the Troglodyte tool developed on the Deep Learning Malware project. Binary Driller performs function matching using the provided function embeddings (function representations), then displays the matches for each function in a layout that mimics the location of each functi
MediumDragon/CyberSecurity-Box
Firewall-System based on OpenWRT or Pi-Hole with UnBound, TOR, optional Privoxy, opt. ntopng and opt. Configuration of the AVM FRITZ!Box with Presets for Security and Port-List. Please visit:
MediumDragon/DaRT
The purpose of this code is to disassemble potentially malicious code into benign pieces that can safely be transported via any number of traditional methods without fear of infection.
MediumDragon/DeepFaceLab
DeepFaceLab is the leading software for creating deepfakes.
MediumDragon/DeepNude-an-Image-to-Image-technology
DeepNude's algorithm and general image generation theory and practice research, including pix2pix, CycleGAN, UGATIT, DCGAN, SinGAN, ALAE, mGANprior, StarGAN-v2 and VAE models (TensorFlow2 implementation). DeepNude的算法以及通用生成对抗网络(GAN,Generative Adversarial Network)图像生成的理论与实践研究。
MediumDragon/deepnude-checkpoints
Original DeepNudeFiles
MediumDragon/deepnudeonline-application
Deepnude online Spring web application. Spring Boot, MVC, Hibernate, Git, Vue.js, Bootstrap.
MediumDragon/deepnudeonline-frontend
Deepnude online frontend application. Vue.js, Node.js, Bootstrap.
MediumDragon/EMV
Exploit, Malware and Vulnerability Scoring Application
MediumDragon/flipperzero-bruteforce
Brute force subghz fixed codes using flipper zero
MediumDragon/flipperzero-gate-bruteforce
Brute Force Gate Remote using Flipper Zero
MediumDragon/FlipperZeroHondaFirmware
Custom Firmware for the Flipper Zero, to add support for Honda key fobs (FCC ID: KR5V2X)
MediumDragon/HERCULES
HERCULES is a special payload generator that can bypass antivirus softwares.
MediumDragon/Incident-Playbook
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
MediumDragon/JohnTheRipper
Jumbo patches for John the Ripper. The "bleeding-jumbo" branch (default) is based on 1.8.0-Jumbo-1. The "master" branch is just a copy of Solar's "john proper" CVS repo, a.k.a. non-Jumbo.
MediumDragon/LBFH
About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
MediumDragon/lokinet
Lokinet is an anonymous, decentralized and IP based overlay network for the internet.
MediumDragon/macOS-Fortress
Firewall and Privatizing Proxy for Trackers, Attackers, Malware, Adware, and Spammers with Anti-Virus On-Demand and On-Access Scanning (PF, squid, privoxy, hphosts, dshield, emergingthreats, hostsfile, PAC file, clamav)
MediumDragon/Microllect
Fully automated btc wallet Attack,using advanced protocols.
MediumDragon/Multitale
Cryptocurrency wallet decryption program written in C# .NET 6.0
MediumDragon/orbot-apple
Orbot VPN app for iOS
MediumDragon/proxychains-ng
proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project. the sf.net page is currently not updated, use releases from github release page instead.
MediumDragon/Python-Rootkit
Python Remote Administration Tool (RAT) to gain meterpreter session
MediumDragon/rocksock
blocking socket library with SSL, SOCKS/HTTP proxy chaining, and timeout
MediumDragon/Rolling_Code_Bypass
Manual scripts to hack into cars :)
MediumDragon/SQLiDumper-AngelSecurityTeam
Dork Search , Vulnerability Scanner ,SQL Injection , XSS , LFI ,RFI
MediumDragon/SQLMutant
SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web applications, uses various techniques to detect vulnerabilities, including pattern matching, error analysis, and timing attacks. The integration of Waybackurls and Arjun allows the tool to find additional
MediumDragon/STAR
Structured Threat Automated Response (STAR) is a script that creates a python run-time for automated response action included in the Structure Threat Information Expression (STIX) Course of Action object. This script can parse a valid STIX json file and execute the included Course of Action.