Pinned Repositories
al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Anubis
Subdomain enumeration and information gathering tool
archerysec
Open Source Vulnerability Assessment and Management helps developers and pentesters to perform scans and manage vulnerabilities.
coffeeMiner
collaborative (mitm) cryptocurrency mining pool in wifi networks
comission
WhiteBox CMS analysis
Cr3dOv3r
Know the dangers of credential reuse attacks.
fuxploider
File upload vulnerability scanner and exploitation tool.
Infoga
Infoga - Email Information Gathering
OWASP-Nettacker
Automated Penetration Testing Framework
sqlmap
Automatic SQL injection and database takeover tool
jacielaurelio's Repositories
jacielaurelio/Anubis
Subdomain enumeration and information gathering tool
jacielaurelio/fuxploider
File upload vulnerability scanner and exploitation tool.
jacielaurelio/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
jacielaurelio/archerysec
Open Source Vulnerability Assessment and Management helps developers and pentesters to perform scans and manage vulnerabilities.
jacielaurelio/coffeeMiner
collaborative (mitm) cryptocurrency mining pool in wifi networks
jacielaurelio/Cr3dOv3r
Know the dangers of credential reuse attacks.
jacielaurelio/Infoga
Infoga - Email Information Gathering
jacielaurelio/OWASP-Nettacker
Automated Penetration Testing Framework
jacielaurelio/pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
jacielaurelio/pyfiscan
Free web-application vulnerability and version scanner
jacielaurelio/DNSExfiltrator
Data exfiltration over DNS request covert channel
jacielaurelio/DVWA
Damn Vulnerable Web Application (DVWA)
jacielaurelio/GTScan
The Nmap Scanner for Telco
jacielaurelio/In-Spectre-Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
jacielaurelio/retdec
RetDec is a retargetable machine-code decompiler based on LLVM.
jacielaurelio/RFCrack
A Software Defined Radio Attack Tool
jacielaurelio/blog
🚀 My personal blog made with Tailwind CSS and NextJS. Template from Timlrx. Feel free to fork, follow and use.
jacielaurelio/Deep-Live-Cam
real time face swap and one-click video deepfake with only a single image
jacielaurelio/DracOS_VENOMIZER
hacking tools package
jacielaurelio/ezfolio
Open Source Portfolio/Resume CMS built using Laravel, React and Ant Design.
jacielaurelio/freebsd
My FreeBSD custom Dwm
jacielaurelio/hello
Desktop system for creators with a focus on simplicity, elegance, and usability. Based on FreeBSD. Less, but better!
jacielaurelio/i3-configs
My i3 configuration
jacielaurelio/jacielaurelio.github.io
Personal Website
jacielaurelio/nextjs-tailwindcss-portfolio
Next.js, React & Tailwind CSS version of the portfolio project.
jacielaurelio/nobelium
A static blog build on top of Notion and NextJS, deployed on Vercel.
jacielaurelio/nullstack
Feature-Driven Ful Stack JavaScript Components
jacielaurelio/roop-cam
real time face swap and one-click video deepfake with only a single image (Uncensored)
jacielaurelio/Sn1per
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
jacielaurelio/wagtail
A Django content management system focused on flexibility and user experience