Skip to content
:shipit:
We live by the code & was raised by ethics
:shipit:
We live by the code & was raised by ethics

Highlights

  • Pro

Organizations

@NgeSEC @bashidorg

Pinned

  1. Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…

    C 4.3k 1.5k

  2. Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and …

    Shell 816 227

  3. Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powe…

    C++ 598 197

  4. Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting

    Python 537 129

  5. This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it w…

    Shell 424 124

  6. BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be u…

    Python 370 185

240 contributions in the last year

Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Mon Wed Fri

Contribution activity

July 2020

Screetsec has no activity yet for this period.

June 2020

9 contributions in private repositories Jun 26 – Jun 29

Seeing something unexpected? Take a look at the GitHub profile guide.

You can’t perform that action at this time.