Name: Tulio A M Mendes
Type: User
Company: MAKESYS TECNOLOGIA
Bio: CEO at Makesys Tecnologia. Knowledges: Linux, FreeBSD and Windows OSes; C/C++, Assembly x86/MIPS, Pascal, PHP, Java, JavaScript and Python programing languages.
Twitter: tadryanom
Location: Av. dos Franceses, 244, Caratatiua, São Luis-MA
Blog: https://www.linkedin.com/in/tulio-adriano-muniz-mendes-73518035/
Tulio A M Mendes's Projects
hydra
IPv6 attack toolkit
A curated list of various bug bounty tools
libopencm3 and FreeRTOS projects using the STM32F103C8T6 MCU
Learn Next.js Starter Code
Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Text-based user interface CSS library
Remote forensics meta tool
The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.
Nostr client for Android
PingCastle - Get Active Directory Security at 80% in 20% of the time
Drupal remote code execution vulnerabilty
Collection of malware source code for a variety of platforms in an array of different programming languages.
Vyatta WebGUI
Top level build scripts for VyOS > 1.2.0
A single Web3 provider solution for all Wallets
Websocket Server and Client Library written in Lazarus
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
A bundler for javascript and friends. Packs many modules into a few bundled assets. Code Splitting allows for loading parts of the application on demand. Through "loaders", modules can be CommonJs, AMD, ES6 modules, CSS, Images, JSON, Coffeescript, LESS, ... and your custom stuff.
Exploit for LPE in ZoneAlarm Antivirus/Firewall
Wiring Framework
Export googleOTP app to anOTP
RouterOS Linux 3.3.5 patch
Cross-Platform C++ GUI Library
An open-source x64/x32 debugger for windows.
A collection of x64dbg scripts. Feel free to submit a pull request to add your script.
Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.