Jerome (@Jeromeyoung)
  • Stars
    star
    364
  • Global Rank 76,071 (Top 3 %)
  • Followers 72
  • Following 5
  • Registered over 6 years ago
  • Most used languages
    Python
    37.5 %
    Java
    25.0 %
    Shell
    12.5 %
    Ruby
    12.5 %
    Go
    12.5 %
  • Location 🇨🇳 China
  • Country Total Rank 10,164
  • Country Ranking
    Java
    1,856
    Ruby
    2,240
    Shell
    5,037
    Go
    8,862

Top repositories

1

JNDIExploit-1

一款用于JNDI注入利用的工具,大量参考/引用了Rogue JNDI项目的代码,支持直接植入内存shell,并集成了常见的bypass 高版本JDK的方式,适用于与自动化工具配合使用。
Java
312
star
2

log4j2burpscanner

CVE-2021-44228,log4j2 burp插件 Java版本,dnslog选取了非dnslog.cn域名
Java
24
star
3

CVE-2021-40154

POC to test the BootROM vulnerability found in LPC55S69 and K82 Series
Python
4
star
4

fish-hub

钓鱼打点:社交钓鱼、邮件钓鱼
Python
4
star
5

DBJ-1

大宝剑-边界资产梳理工具(红队、蓝队、企业组织架构、子域名、Web资产梳理、Web指纹识别、ICON_Hash资产匹配)
Python
3
star
6

CobaltStrike-Update

Cobalt Strike is a powerful threat emulation tool that provides a post-exploitation agent and covert channels ideal for Adversary Simulations and Red Team exercises. With Cobalt Strike, companies can emulate the tactics and techniques of a quiet long-term embedded threat actor in an IT network. Malleable C2 lets you change your network indicators to look like different malware each time. These tools complement Cobalt Strike's solid social engineering process, its robust collaboration capability, and unique reports designed to aid blue team training.
Shell
2
star
7

cocomelonc.github.io

Cybersecurity blog. Red Team, pentest, malware analysis and dev
Ruby
1
star
8

bruhdotzip

Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the password can be changed by Blue Team.
Go
1
star
9

exp-hub

漏洞利用:打点案例
1
star