Pinned Repositories
cantools
CAN bus tools.
decrypt-chrome-passwords
DS-ML-Public
Python Scripts and Jupyter Notebooks
EEPROM-CAT24C208
read-write EEPROM CAT24C208
Enable-RDP-One-Liner-CMD
post/windows/manage/enable_rdp Metaploit module in Command prompt module
ESP32Marauder
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
lipopi
Guide to setting up LiPo batteries on the Raspberry Pi
magspoof_flipper
Work-in-progress port of Samy Kamkar's MagSpoof project (http://samy.pl/magspoof/) to the Flipper Zero. Enables wireless emulation of magstripe data, using the inbuilt RFID coil as an electromagnet.
Nim-Reverse-Shell
A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educational purposes only.
nim-shelld
Reverse shell that can bypass windows defender detection
e1337r0x0r's Repositories
e1337r0x0r/cantools
CAN bus tools.
e1337r0x0r/decrypt-chrome-passwords
e1337r0x0r/DS-ML-Public
Python Scripts and Jupyter Notebooks
e1337r0x0r/EEPROM-CAT24C208
read-write EEPROM CAT24C208
e1337r0x0r/Enable-RDP-One-Liner-CMD
post/windows/manage/enable_rdp Metaploit module in Command prompt module
e1337r0x0r/ESP32Marauder
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
e1337r0x0r/lipopi
Guide to setting up LiPo batteries on the Raspberry Pi
e1337r0x0r/magspoof_flipper
Work-in-progress port of Samy Kamkar's MagSpoof project (http://samy.pl/magspoof/) to the Flipper Zero. Enables wireless emulation of magstripe data, using the inbuilt RFID coil as an electromagnet.
e1337r0x0r/Nim-Reverse-Shell
A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educational purposes only.
e1337r0x0r/nim-shelld
Reverse shell that can bypass windows defender detection
e1337r0x0r/omg-payloads
Official payload library for the O.MG line of products from Mischief Gadgets
e1337r0x0r/P4wnP1
P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.
e1337r0x0r/P4wnP1_aloa
P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming and physical engagements ... or into "A Little Offensive Appliance".
e1337r0x0r/pinjectra
Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)
e1337r0x0r/PiSugar
PiSugar is a battery module for Raspberry Pi zero / zero W / zero WH
e1337r0x0r/poisontap
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
e1337r0x0r/postenum
Postenum is a clean, nice and easy tool for basic/advanced privilege escalation techniques. Postenum tool is intended to be executed locally on a Linux box.
e1337r0x0r/powershell-reverse-tcp
PowerShell scripts for communicating with a remote host.
e1337r0x0r/proxmark3
Proxmark3 RDV4.0 based on iceman fork
e1337r0x0r/Quasar
Remote Administration Tool for Windows
e1337r0x0r/Raptor_Capture
GNURadio Flow Chart for capturing Ford 900Mhz keyfobs.
e1337r0x0r/RedTeamPowershellScripts
Various PowerShell scripts that may be useful during red team exercise
e1337r0x0r/reverse-shell-generator
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
e1337r0x0r/TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
e1337r0x0r/usbrubberducky-payloads
The Official USB Rubber Ducky Payload Repository
e1337r0x0r/UsoDllLoader
Windows - Weaponizing privileged file writes with the Update Session Orchestrator service
e1337r0x0r/xml_example