Skip to content
View J0hnTh3Kn1ght's full-sized avatar
🤖
Working with cybersecurity
🤖
Working with cybersecurity

Block or report J0hnTh3Kn1ght

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
J0hnTh3Kn1ght/README.md
💻 Other Projects:

sar2HTML Exploit -> Exploit the Sar2HTML RCE vulnerability and also perform a Shell Upload on the target.

CVE-2014-6271 -> Exploitation of "Shellshock" Vulnerability. Remote code execution in Apache with mod_cgi.

Windows-PrivEsc -> Scanner for Windows Local Privilege Escalation && Built in Python and Powershell.

Force Cannon -> Brute force tool made in ruby, that performs attacks on login forms using POST

Mr Hash -> Decryption, hash cracking and various other utilities to optimize your hacking or privilege escalation.

CronJob Exploit -> Privilege escalation using an writable file that will be executed by a privileged user in a Cron task.

Windows Malware | Process Injection -> Injection of malicious code into legitimate Windows processes and simple malware

LFI Hunter -> Automated tool to bypass filtering systems and exploit Local File Inclusion

Pinned Loading

  1. Malicious_Plugin Malicious_Plugin Public

    Hacking WordPress Plugins - Authenticated Shell Upload, by compromising admin console and upload a malicious plugin with PHP (reverse shell code)

    Python 20 1

  2. KoopaShell KoopaShell Public

    🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐢

    Rust 15

  3. ExploitDB-Hunter ExploitDB-Hunter Public

    Lightweight && straight forward command-line tool for searching and downloading exploits from Exploit-DB.

    Python 16 1

  4. Hazard Hazard Public

    Hazard is a dictionary brute-force attack, constructed using the Rust language for the most sensitive network protocols and services, including FTP, SSH, PostgreSQL, MySQL, and Samba (SMB networkin…

    Rust 11 3

  5. Keylogger-Evil_Server Keylogger-Evil_Server Public

    POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker

    Python 6 3

  6. CatBinaries CatBinaries Public

    Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques

    Shell 4 2