Name: Juan Espin
Type: User
Company: Telefónica - RedTeam
Bio: Certified Ethical Hacker, Security Researcher, Bugbounter, Threathunter, Malware Analyst..
Dirección de BTC
35izP9cesLJXAvQnAR2aGKjTs7eJWBEj7y
Location: Madrid, Spain
Blog: hacklejandria.com
Juan Espin's Projects
3design Stl Models for Jewelry
Android Pentesting - Methodology, tools...
A collection of red team and adversary emulation resources developed and released by MITRE.
BurpSuite_Pro_v1.7.32
A tool that performs HULK HTTP flood, Ping of Death, UDP flood, SNMP, Smurf ICMP, and Slowloris attacs
Machine learning face recognition combined with a drone and osint tools
开源人脸口罩检测模型和数据 Detect faces and determine whether people are wearing mask.
Collection of recognition / enumeration scripts
iCloud Bypass script for 12.5.5 iOS
Penetration testing “drop box”
mcPollo Cydia repository
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
Some Redteam & ctf tools
Now.. Hacking with Frida Powers!
Redteaming HID Attacks
Runtime Mobile Security (RMS) is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime
Bulk scanning of Hosts and IPs using the Shodan API
WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.
WiFi Enabled USB Rubber Ducky
Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4
Disconnect all Nearby WiFi Devices by Sending Packets.
Directional wifi antenna servo controlled
Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.
Object tracking implemented with YOLOv3, Deep Sort and Tensorflow.