jheeree
| Ingeniero en Conectividad y Redes | CEH | NSE4 | eJPT | Autodidacta | CTF Player | Mod/Admin en comunidad L4tin-HTB
/dev/null
Pinned Repositories
apk2url
A tool to quickly extract IP and URL endpoints from APKs by disassembling and decompiling
APKHunt
APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security testers, it can be used by anyone to identify and address potential security vulnerabilities in their code.
AppleJuice
Apple BLE proximity pairing message spoofing
awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
clickjacking-check
CVE-2022-1388-checker
Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)
cvss-calc
Simple-CVE-2021-41773-checker
Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)
jheeree's Repositories
jheeree/uptime
📈 Uptime monitor and status page for Jhere, powered by @upptime
jheeree/apk2url
A tool to quickly extract IP and URL endpoints from APKs by disassembling and decompiling
jheeree/APKHunt
APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security testers, it can be used by anyone to identify and address potential security vulnerabilities in their code.
jheeree/AppleJuice
Apple BLE proximity pairing message spoofing
jheeree/Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
jheeree/jheeree.github.io
jheeree/bjcp-styleview
jheeree/chiasmodon
Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials, CIDRs , ASNs , and subdomains, the tool also allows users to search Google Play application ID.
jheeree/cloudflare-ddns
🎉🌩️ Dynamic DNS (DDNS) service based on Cloudflare! Access your home network remotely via a custom domain name without a static IP!
jheeree/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
jheeree/CVE-2024-23897
CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner.
jheeree/decider
A web application that assists network defenders, analysts, and researcher in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.
jheeree/ExtractBitlockerKeys
A post-exploitation python script to automatically extract the bitlocker recovery keys from a domain.
jheeree/git-rotate
Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking
jheeree/GitFive
🐙 Track down GitHub users.
jheeree/glit
Retrieve all mails of users related to a git repository, a git user or a git organization
jheeree/GoMapEnum
User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin
jheeree/Hunting-Queries-Detection-Rules
Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
jheeree/LolDriverScan
Scan vulnerable drivers on Windows with loldrivers.io
jheeree/movie-web
A small web app for watching movies and shows easily
jheeree/pyrdp
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
jheeree/Qu1cksc0pe
All-in-One malware analysis tool.
jheeree/rekono
Execute full pentesting processes combining multiple hacking tools automatically
jheeree/ropci
So, you think you have MFA? AAD/ROPC/MFA bypass testing tool
jheeree/SAP-Threat-Modeling
The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features like inputting SAP credentials, scanning for connections, and visualizing the network.
jheeree/Splunk-RCE-poc
jheeree/Spray365
Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to bypass Azure Smart Lockout and insecure conditional access policies.
jheeree/stable-diffusion-webui-forge
jheeree/static-binaries
Various *nix tools built as statically-linked binaries
jheeree/SwaggerSpy
Automated OSINT on SwaggerHub