Skip to content
View Ashadowkhan's full-sized avatar

Highlights

  • Pro

Block or report Ashadowkhan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results
Shell 1 Updated Nov 17, 2024

best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect

Python 803 184 Updated Nov 27, 2024

Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.

Go 254 32 Updated Aug 20, 2024

RobinHood - Bug Hunting Recon Automation Script

Shell 32 15 Updated Nov 18, 2022

Script to Automate installtion of Apps ,frida server and moving Burpsuite certificate to root folder

Shell 264 48 Updated Jan 28, 2024

⚡Extracting the Machine Readable Zone (MRZ) from passport or any document images

Python 41 11 Updated Dec 26, 2024
1 Updated Jun 8, 2024

This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".

Go 953 66 Updated Mar 17, 2024

The recursive internet scanner for hackers. 🧡

Python 7,430 561 Updated Dec 24, 2024

AppsecStudy - open-source elearning management system for information security

JavaScript 6 2 Updated Jan 9, 2024

Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malicious threats. Let's delve into the tasks and functions tha…

Python 243 42 Updated Nov 6, 2024

WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target …

Python 94 23 Updated Jul 1, 2024

functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forgery (SSRF), and Path Traversal.

Python 78 12 Updated Apr 21, 2024

🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)

Python 1,312 222 Updated Aug 18, 2024

A collection of all the data i could extract from 1 billion leaked credentials from internet.

1 Updated Jul 1, 2020

A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon

JavaScript 1 Updated Jul 6, 2022

Dynamit: Dynamic Vulnerability Detection of Ethereum Smart Contracts Using Machine Learning by @mojtaba-eshghie

Jupyter Notebook 1 Updated Sep 22, 2022

FaizoO Mac

Shell 1 Updated Dec 7, 2021
Python 585 267 Updated Nov 7, 2024

The only reliable agent framework built on top of the latest OpenAI Assistants API.

Python 2,998 787 Updated Dec 26, 2024

:: Prism X · Automated Enterprise Network Security Risk Detection and Vulnerability Scanning Tool / 棱镜 X · 自动化企业网络安全风险检测、漏洞扫描工具

TypeScript 503 54 Updated Aug 21, 2024

This PHP-based E-Commerce website, created by Pritish Purav, integrates Razorpay for payments and Google Auth for user authentication. The application uses a MySQL database to store user and produc…

PHP 8 1 Updated Mar 8, 2024

Using Polars to analyze traffic information; in this example, toll booth data from Alvarado, located in the Tolima department of Colombia, was utilized. The data is collected by the National Infras…

Jupyter Notebook 4 Updated Mar 6, 2024

reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …

JavaScript 1 Updated Sep 17, 2022

Private Nuclei Templates

1 Updated Nov 15, 2023
Next