Skip to content
View screetsec's full-sized avatar
:shipit:
We live by the code & was raised by ethics
:shipit:
We live by the code & was raised by ethics

Highlights

  • Pro

Organizations

@NgeSEC @bashidorg
Block or Report

Block or report screetsec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned

  1. TheFatRat TheFatRat Public

    Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…

    C 8.9k 2.2k

  2. Sudomy Sudomy Public

    Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting

    Shell 1.9k 366

  3. Dracnmap Dracnmap Public

    Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and …

    Shell 1.1k 266

  4. Brutal Brutal Public

    Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powe…

    C++ 1k 258

  5. Vegile Vegile Public

    This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it w…

    Shell 695 162

  6. BruteSploit BruteSploit Public

    BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be u…

    Python 694 270