Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
@d4t4s3c
d4t4s3c
Follow
View d4t4s3c's full-sized avatar

Miguel R. d4t4s3c

nc -lvnp 443

Highlights

  • Pro

Organizations

@VulNyx

Block or report d4t4s3c

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more aboutblocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more aboutreporting abuse.

Report abuse

PinnedLoading

  1. peass-ng/PEASS-ngpeass-ng/PEASS-ngPublic

    PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)

    C# 17.1k 3.2k

  2. GTFOBins/GTFOBins.github.ioGTFOBins/GTFOBins.github.ioPublic

    GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

    HTML 11.4k 1.4k

  3. OffensiveReverseShellCheatSheetOffensiveReverseShellCheatSheetPublic

    Collection of reverse shells for red team operations.

    PowerShell 486 97

  4. Win7BlueWin7BluePublic

    Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits

    Python 154 20

  5. RSAcrackRSAcrackPublic

    Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful collision occurs.

    Shell 68 14

  6. suForcesuForcePublic

    Obtain a user's system password, this tool uses the su binary to perform a brute force attack until a successful collision occurs.

    Shell 35 13


[8]ページ先頭

©2009-2025 Movatter.jp