Giter Site home page Giter Site logo

šŸ‘‹ there, I'm Olajuwon - aka āœØ D3epDiv3r āœØ

Twitter Follow

I'm an Ethical Hacking and Cybersecurity Student, Full Stack Web Developer, and a Technological Enthusiast

  • šŸŒ± Iā€™m currently learning everything šŸ¤£
  • šŸ‘Æ Iā€™m looking to collaborate with other like-minded individuals
  • āš” Fun facts: I love Hacking. I love Coding. I love Computers.

Spotify Playing šŸŽ§

codeSTACKr Spotify Playing


Some Languages and Tools:

Visual Studio Code

HTML5

CSS3

Sass

JavaScript

MySQL

Git

boot

burp

kali

laravel

metasploit

nmap

php

python

snort

vuejs

wireshark

Terminal


Olajuwon Faleke's Projects

anti-virus-evading-payloads icon anti-virus-evading-payloads

During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!

auto-gpt icon auto-gpt

An experimental open-source attempt to make GPT-4 fully autonomous.

block-site icon block-site

A browser extension to block website access using hostname matching

filesystem-monitoring icon filesystem-monitoring

Basic Filesystem or Directory Monitoring tool for Windows built using Python's API library "Watchdog".

fud-backdoor icon fud-backdoor

Create a fully undetectable backdoor with simple steps.

godgenesis icon godgenesis

A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.

howtohunt icon howtohunt

Collection of methodology and test case for various web vulnerabilities.

maskphish icon maskphish

Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.

mhddos icon mhddos

Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods

ohmyzsh icon ohmyzsh

šŸ™ƒ A delightful community-driven (with 2,000+ contributors) framework for managing your zsh configuration. Includes 300+ optional plugins (rails, git, macOS, hub, docker, homebrew, node, php, python, etc), 140+ themes to spice up your morning, and an auto-update tool so that makes it easy to keep up with the latest updates from the community.

pagodo icon pagodo

pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    šŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. šŸ“ŠšŸ“ˆšŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ā¤ļø Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.