lowsecurity777
Hello, my name is lowanz, welcome to my github account, don't hesitate to clone this repository because it's taken from my public :) don't forget to star, 🐦🙇
Asia,Indonesia,Jakarta
Pinned Repositories
aclpwn.py
Active Directory ACL exploitation with BloodHound
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
apache-rootkit
A malicious Apache module with rootkit functionality
ApacheTomcatScanner
A python script to scan for Apache Tomcat server vulnerabilities.
Bug_Bounty_writeups
BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔
mod-rootme
Ye olde root shell for ye olde httpd
Scanners-Box
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
subjack
Subdomain Takeover tool written in Go
wp-brute-xmlrpc
Multiple Brute Force XMLRPC [Wordpress]
lowsecurity777's Repositories
lowsecurity777/Scanners-Box
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
lowsecurity777/Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
lowsecurity777/ApacheTomcatScanner
A python script to scan for Apache Tomcat server vulnerabilities.
lowsecurity777/AsyncRAT-C-Sharp
Open-Source Remote Administration Tool For Windows C# (RAT)
lowsecurity777/Awesome-RCE-techniques
Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
lowsecurity777/BLACKHAT_USA2022
BLACKHAT USA2022 PDF Public
lowsecurity777/commix
Automated All-in-One OS Command Injection Exploitation Tool.
lowsecurity777/cs-video-courses
List of Computer Science courses with video lectures.
lowsecurity777/CVE-2021-4154
CVE-2021-4154 exploit
lowsecurity777/cve-2022-33891
Apache Spark Shell Command Injection Vulnerability
lowsecurity777/Dorks-collections-list
List of Github repositories and articles with list of dorks for different search engines
lowsecurity777/express-server-basic
lowsecurity777/FlavorTown
Various ways to execute shellcode
lowsecurity777/GooFuzz
GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).
lowsecurity777/google-dorks
Useful Google Dorks for WebSecurity and Bug Bounty
lowsecurity777/GRUB-Theme
:information_source: GRUB Themes with the theme from the anime The Quintessential Quintuplets, Fate Series, and VTuber Hoshimati Suisei :computer: :heart:
lowsecurity777/hoaxshell
An unconventional Windows reverse shell, currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic.
lowsecurity777/impacket-easy-web-server
Impacket is a collection of Python classes for working with network protocols.
lowsecurity777/linux-smart-enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
lowsecurity777/Malware-collection
🔬Collection(-BIGGEST-) of malware, ransomware, RATs, botnets, stealers, etc.
lowsecurity777/NoRed0x.github.io
lowsecurity777/phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
lowsecurity777/PSFuzz
Proviesec Fuzz Scanner - dir/path web scanner
lowsecurity777/PyPhisher
Easy to use phishing tool with 77 website templates. Author is not responsible for any misuse.
lowsecurity777/python-keylogger
lowsecurity777/simple-php-web-shell
Tiny PHP Web shell for executing unix commands from web page
lowsecurity777/SSH-BRUTEFORCE-PYTHON
this script will perform a password brute force attack for ssh
lowsecurity777/sshuttle
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
lowsecurity777/ssti-payload
SSTI Payload Generator
lowsecurity777/tbhm
The Bug Hunters Methodology