- Boston, USA
- https://www.linkedin.com/in/harshitnic/
Stars
An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRIDE methodology.
Program for determining types of files for Windows, Linux and MacOS.
🌐 The Internet OS! Free, Open-Source, and Self-Hostable.
Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel
iOS iBugBazaar: Your mobile appsec playground to Explore, Exploit, Excel
Resources , Notes , Videos of Operating System
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
freeCodeCamp.org's open-source codebase and curriculum. Learn to code for free.
All the resources you need to get to Senior Engineer and beyond
💯 Curated coding interview preparation materials for busy software engineers
A resource to help you become good at work 👇
Interactive roadmaps, guides and other educational content to help developers grow in their careers.
Collection of Cyber Threat Intelligence sources from the deep and dark web
Wiki to collect Red Team infrastructure hardening resources
P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming and physical engagements ... or into "A Little Offensive Ap…
Red Teaming Tactics and Techniques
Tools & Interesting Things for RedTeam Ops
A list of Free Software network services and web applications which can be hosted on your own servers
Cipher7 / Infosec-Notes
Forked from zweilosec/Infosec-NotesNotes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to …
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube
🕵️ OSINT Tools for gathering information and actions forensics 🕵️
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).
Resources and demos from the DEFCON 30 Brief "Space Jam: Exploring Radio Frequency Attacks in Outer Space" by James Pavur