Pinned Repositories
airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
angular-phonecat
Tutorial on building an angular application.
archtorify
Transparent proxy through Tor for Arch Linux OS
fluxion
FLUXION
metasploit-framework
Metasploit Framework
izidima's Repositories
izidima/metasploit-framework
Metasploit Framework
izidima/archtorify
Transparent proxy through Tor for Arch Linux OS
izidima/cChoco
Community resource to manage Chocolatey
izidima/Cloak
Cloak can backdoor any python script with some tricks.
izidima/CrackMapExec
A swiss army knife for pentesting networks
izidima/EvilRAT
Undetectable payload for Windows 10 and 11
izidima/geckodriver
WebDriver for Firefox
izidima/Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
izidima/I-See-You
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
izidima/JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
izidima/L3MON
L3MON - Remote Android Managment Suite
izidima/metasploit-cheat-sheet
Metasploit Cheat Sheet 💣
izidima/metasploit-payloads
Unified repository for different Metasploit Framework payloads
izidima/metsploit-edits
izidima/mobile-detect.js
Device detection (phone, tablet, desktop, mobile grade, os, versions)
izidima/nmap-vulners
NSE script based on Vulners.com API
izidima/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
izidima/pcurvepy
Principal curves implementation (Hastie '89) in Python
izidima/PhoneInfoga
Advanced information gathering & OSINT tool for phone numbers.
izidima/platform-samples
A public place for all platform sample projects.
izidima/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
izidima/ProcMon-for-Linux
Procmon is a Linux reimagining of the classic Procmon tool from the Sysinternals suite of tools for Windows. Procmon provides a convenient and efficient way for Linux developers to trace the syscall activity on the system.
izidima/pymetasploit
A full-fledged msfrpc library for Metasploit framework.
izidima/pypykatz
Mimikatz implementation in pure Python
izidima/Python-RAT
Remote Administration tool for Windows Systems written in pure Python
izidima/reverse-shell-cheatsheet
🙃 Reverse Shell Cheat Sheet 🙃
izidima/rubygems
Library packaging and distribution for Ruby.
izidima/saint
(s)AINT is a Spyware Generator for Windows systems written in Java.
izidima/social_mapper
A Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf)
izidima/TheFatRat-1
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .