Skip to content
View Jsmoreira02's full-sized avatar
🤖
Working with cybersecurity
🤖
Working with cybersecurity
Block or Report

Block or report Jsmoreira02

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Jsmoreira02/README.md

Hello, friend! I am an Ethical Hacker, CTF Player and IT intern, also working with Bug Bounty and playing WoW in my spare time. I am a big fan of malware and exploit development, and I also have a lot of fun creating hacking tools.

Tech Stack:

LinkedIn TryHackMe Instagram

python logo ruby logo rust logo c logo bash logo powershell logo

Hope you like my projects (if you do, please consider giving them a star ⭐). I'm always around developing cybersecurity tools and exploits 👨‍💻

⚡ Other Projects:

sar2HTML Exploit -> Exploit the Sar2HTML RCE vulnerability and also perform a Shell Upload on the target.

Mr. Hash -> Decryption, Hash cracking and Several other uses. Built for CTF and Hacking

Show Me The Ports -> Scanning and enumeration of open ports on target machine for pentest recognition step.

CVE-2014-6271 -> Shellshock cgi-bin Exploitation. Remote Command Execution Vulnerability

  • Check it out -> offsec.tools <- The place I go to find good bug bounty tools.
  • A bit of motivation: -> Great Stuff <-
  • Check out my other account, focused on development: JMoreira2Dev

Pinned

  1. Pwn_wordpress Pwn_wordpress Public

    Hacking WordPress Plugins - Authenticated Shell Upload, by compromising admin console and upload a malicious plugin with PHP (reverse shell code)

    Python 7 1

  2. Cronjob-Exploit Cronjob-Exploit Public

    Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)

    Shell 3

  3. Keylogger-Evil_Server Keylogger-Evil_Server Public

    Advanced keylogger and covert channel - for receiving victim's keystrokes and clipboard data. You can send the results to the attacker's Email when the execution is finished, as well as write the d…

    Python 4 4

  4. ForceCannon ForceCannon Public

    "Force Cannon" is a brute force tool made in ruby, that performs attacks on login forms using the POST method without robust filters or protections.

    Ruby 2

  5. Wind0wsM4lware_ Wind0wsM4lware_ Public

    Works in any version from Windows 7 to 11. Injection of malicious code into legitimate Windows processes for evasion and simple malware to gain unauthorized access, using the Windows API. Serves as…

    C 1

  6. LFI-Hunter LFI-Hunter Public

    Automated tool to bypass filtering systems and exploit Local File Inclusion, created for Bug Bounty tests and better optimization during the hack (and with special attention to CTFs)

    Python 1