Sp3ctr@lM0nki3's Projects
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Privilege Escalation Project - Windows / Linux / Mac
An Adavnced Automation Tool For Web-Recon Developed For Linux Systems
Bug Bounty Tools used on Twitch - Recon
ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules
ā” Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ā”
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Scan files or process memory for CobaltStrike beacons and parse their configuration
Easy countdown timer
Search The Deep Web Straight From Your Terminal
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password š”ļø
Empire is a PowerShell and Python 3.x post-exploitation framework.
Fast web fuzzer written in Go
Software for fuzzing, used on web application pentestings.
šµļøāāļø Investigate Google emails and documents.
HiddenEye with completely new codebase and better features set
A Framework meant for the exploitation of iOS devices.
Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Cracking Hashes / Hashing
Linux enumeration tool for pentesting and CTFs with verbosity levels
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
Automated Penetration Testing Framework
š§® An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment
CLI & library to search for default credentials among thousands of Products / Vendors
Basic Password Generator
Image Payload Creating/Injecting tools
Privilege Escalation Enumeration Script for Windows
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
šø Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! š§āāļø
QR Code Generator
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.