Pinned Repositories
2016
bSidesLisbon 2016 event contents
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
awesome-infosec
A curated list of awesome infosec courses and training resources.
Bella
A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻
bitcoin_ticker
housing
knock
Knock Subdomain Scan
MBE
Course materials for Modern Binary Exploitation by RPISEC
poisontap
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
djpalmer88's Repositories
djpalmer88/2016
bSidesLisbon 2016 event contents
djpalmer88/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
djpalmer88/awesome-infosec
A curated list of awesome infosec courses and training resources.
djpalmer88/Bella
A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻
djpalmer88/bitcoin_ticker
djpalmer88/housing
djpalmer88/knock
Knock Subdomain Scan
djpalmer88/MBE
Course materials for Modern Binary Exploitation by RPISEC
djpalmer88/poisontap
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
djpalmer88/pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
djpalmer88/pwntools
CTF framework and exploit development library
djpalmer88/Radium-Keylogger
Python keylogger with multiple features.
djpalmer88/rails-security-checklist
:key: Community-driven Rails Security Checklist. Contribute and share your experience
djpalmer88/ruby_rat
djpalmer88/SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
djpalmer88/Stitch
Python Remote Administration Tool (RAT)
djpalmer88/tbhm
The Bug Hunters Methodology
djpalmer88/theZoo
A repository of LIVE malwares for your own joy and pleasure
djpalmer88/trump_bot