8000 ricardojba (Ricardo) / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View ricardojba's full-sized avatar

Block or report ricardojba

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results
PowerShell 1,598 309 Updated Apr 14, 2025

😺 Running Hashcat on Google Colab with session backup and restore.

Jupyter Notebook 738 110 Updated Jan 14, 2022

Everything you need about Burp Extension Generation

Java 154 27 Updated Jan 6, 2023

GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects

Python 248 51 Updated Sep 26, 2020

Notes about attacking Jenkins servers

Python 2,057 337 Updated Jul 10, 2024

Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenge…

Python 1,557 264 Updated Jun 19, 2021

Apache Solr Injection Research

577 65 Updated Jan 28, 2020

Sample pentest report provided by TCM Security

1,211 313 Updated Mar 18, 2022

Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.

5,537 1,104 Updated Aug 14, 2024

Red team & penetration testing tools to exploit the capabilities of Intel AMT

Python 258 31 Updated Apr 6, 2021
Python 264 46 Updated Mar 19, 2019

Linux privilege escalation checks (systemd, dbus, socket fun, etc)

Python 289 35 Updated Oct 2, 2019

A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux

Python 1,371 283 Updated Oct 3, 2020

Proof of Concepts

Python 1,259 318 Updated Nov 12, 2024

Reverse proxies cheatsheet

Python 1,820 213 Updated Nov 4, 2023

Exchange your privileges for Domain Admin privs by abusing Exchange

Python 1,018 173 Updated Jan 23, 2020

Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java

Java 55 20 Updated Jul 21, 2016

Orc is a post-exploitation framework for Linux written in Bash

Shell 395 53 Updated Nov 12, 2019

This document describes common misconfigurations of F5 Networks BigIP systems.

229 42 Updated Aug 1, 2019

ffmpeg exploitation tool

JavaScript 28 5 Updated Aug 3, 2016

PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.

C# 1,013 149 Updated May 29, 2024
JavaScript 3 Updated Sep 12, 2019

Scripts created to help with post exploitation of a Windows host

PowerShell 97 38 Updated Feb 1, 2021

This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or an…

Python 214 57 Updated Aug 4, 2018

This tool generates gopher link for exploiting SSRF and gaining RCE in various servers

Python 3,100 390 Updated Apr 18, 2023

Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)

Python 515 455 Updated Oct 16, 2020

Community guide to securing and improving privacy on macOS.

21,829 1,463 Updated May 9, 2025

Takes a URL and checks the system for the tilde enum vuln and then find the files.

Python 171 68 Updated Jan 27, 2019
PowerShell 53 8 Updated May 21, 2018
Python 387 96 Updated Jun 9, 2025
Next
0