Skip to content
View screetsec's full-sized avatar
:shipit:
We live by the code and was raised by ethics
:shipit:
We live by the code and was raised by ethics

Highlights

  • Pro

Organizations

@NgeSEC @bashidorg

Block or report screetsec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. TheFatRat Public

    Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…

    C 9.8k 2.3k

  2. Sudomy Public

    Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting

    Shell 2.1k 394

  3. Dracnmap Public

    Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and …

    Shell 1.2k 268

  4. Brutal Public

    Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powe…

    C++ 1.1k 272

  5. Vegile Public

    This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it w…

    Shell 722 164

  6. BruteSploit Public

    BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be u…

    Python 732 261

5 contributions in the last year

Contribution Graph
Day of Week March April May June July August September October November December January February March
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Less
No contributions.
Low contributions.
Medium-low contributions.
Medium-high contributions.
High contributions.
More

Activity overview

Loading A graph representing screetsec's contributions from March 17, 2024 to March 21, 2025. The contributions are 80% commits, 20% issues, 0% pull requests, 0% code review.

Contribution activity

March 2025

screetsec has no activity yet for this period.
Loading