![emacs logo](https://raw.githubusercontent.com/github/explore/80688e429a7d4ef2fca1e82350fe8e3517d3494d/topics/emacs/emacs.png)
Starred repositories
Run Swing based GUI application within the Docker container through the Jetbrains Projector, and access it from browsers.
My experiments in weaponizing Nim (https://nim-lang.org/)
Checksec tool in Python, Rich output. Based on LIEF
Automation for internal Windows Penetrationtest / AD-Security
Self contained htaccess shells and attacks
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Run PowerShell with rundll32. Bypass software restrictions.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
OSINT Tool for Finding Passwords of Compromised Email Addresses
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Automatic SSRF fuzzer and exploitation tool
A tool to capture all the git secrets by leveraging multiple open source git searching tools