Skip to content
View Jsmoreira02's full-sized avatar
🤖
Working with cybersecurity
🤖
Working with cybersecurity

Block or report Jsmoreira02

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Jsmoreira02/README.md

🔥 Hello, Friend!

Malware Coder | Tool Maker | Programming Enthusiast | Ethical Hacker

Hope you like my projects (if you do, please consider giving them a star ⭐). Not being a script kiddie is my main goal. That's why I'm always around developing cybersecurity tools and exploits 👨‍💻

💻 Other Projects:

sar2HTML Exploit -> Exploit the Sar2HTML RCE vulnerability and also perform a Shell Upload on the target.

Force Cannon -> brute force tool. Attack on login forms using the POST method without robust filters or protections

Show Me The Ports -> Scanning and enumeration of open ports on target machine for pentest recognition step.

CronJob Exploit -> Privilege escalation using an writable file that will be executed by a privileged user in a Cron task.

CVE-2014-6271 -> Shellshock cgi-bin Exploitation. Remote Command Execution Vulnerability

LFI Hunter -> Automated tool to bypass filtering systems and exploit Local File Inclusion

  • Check it out -> offsec.tools <- The place I go to find good bug bounty tools.
  • A bit of motivation: -> Great Stuff <-
  • Check out my other account, focused on development: JMoreira2Dev

Pinned Loading

  1. Pwn_wordpress Pwn_wordpress Public

    Hacking WordPress Plugins - Authenticated Shell Upload, by compromising admin console and upload a malicious plugin with PHP (reverse shell code)

    Python 8 2

  2. Hazard Hazard Public

    Hazard is a dictionary brute-force attack, constructed using the Rust language for the most sensitive network protocols and services, including FTP, SSH, PostgreSQL, MySQL, and Samba (SMB networkin…

    Rust 9 2

  3. Keylogger-Evil_Server Keylogger-Evil_Server Public

    POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker

    Python 4 4

  4. Mr_Hash Mr_Hash Public

    This is a tool designed for decryption, hash cracking and various other utilities to optimize your hacking or privilege escalation. It contains the most common types of ciphers/hashes used in pente…

    Python 2

  5. Wind0wsM4lware_ Wind0wsM4lware_ Public

    Injection of malicious code into legitimate Windows processes for evasion and simple malware to gain unauthorized access, using the Windows API. Serves as proof of concept or intrusion detection ex…

    C 1

  6. CatBinaries CatBinaries Public

    Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques

    Shell