Skip to content
View Jsmoreira02's full-sized avatar
🤖
Working with cybersecurity
🤖
Working with cybersecurity

Block or report Jsmoreira02

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Jsmoreira02/README.md

🔥 Hello, Friend!

Malware Dev | Security Researcher | Programming Enthusiast | Ethical Hacker

Hope you like my projects (if you do, please consider giving them a star ⭐). Not being a script kiddie is my main goal. That's why I'm always around developing cybersecurity tools and exploits 👨‍💻

💻 Other Projects:

sar2HTML Exploit -> Exploit the Sar2HTML RCE vulnerability and also perform a Shell Upload on the target.

Force Cannon -> brute force tool. Attack on login forms using the POST method without robust filters or protections

Show Me The Ports -> Scanning and enumeration of open ports on target machine for pentest recognition step.

Mr Hash -> Decryption, hash cracking and various other utilities to optimize your hacking or privilege escalation.

CronJob Exploit -> Privilege escalation using an writable file that will be executed by a privileged user in a Cron task.

CVE-2014-6271 -> Shellshock cgi-bin Exploitation. Remote Command Execution Vulnerability

LFI Hunter -> Automated tool to bypass filtering systems and exploit Local File Inclusion

Pinned Loading

  1. Malicious_Plugin Malicious_Plugin Public

    Hacking WordPress Plugins - Authenticated Shell Upload, by compromising admin console and upload a malicious plugin with PHP (reverse shell code)

    Python 10 3

  2. Hazard Hazard Public

    Hazard is a dictionary brute-force attack, constructed using the Rust language for the most sensitive network protocols and services, including FTP, SSH, PostgreSQL, MySQL, and Samba (SMB networkin…

    Rust 10 3

  3. Keylogger-Evil_Server Keylogger-Evil_Server Public

    POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker

    Python 4 4

  4. KoopaShell KoopaShell Public

    🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐢

    Rust 10

  5. Process_Injection Process_Injection Public

    Injection of malicious code into legitimate Windows processes for evasion and simple malware to gain unauthorized access, using the Windows API. Serves as proof of concept or intrusion detection ex…

    C++ 1

  6. CatBinaries CatBinaries Public

    Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques

    Shell 2 1