The Wayback Machine - https://web.archive.org/web/20200827081911/https://github.com/Screetsec
Skip to content
Avatar
:shipit:
We live by the code & was raised by ethics
:shipit:
We live by the code & was raised by ethics

Highlights

  • Arctic Code Vault Contributor
  • Pro

Organizations

@NgeSEC @bashidorg

Pinned

  1. Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…

    C 4.5k 1.5k

  2. Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and …

    Shell 819 230

  3. Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powe…

    C++ 622 201

  4. Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting

    Python 590 134

  5. This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it w…

    Shell 431 128

  6. BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be u…

    Python 375 194

185 contributions in the last year

Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Mon Wed Fri

Contribution activity

August 2020

9 contributions in private repositories Aug 18 – Aug 21
You can’t perform that action at this time.