-
bKash
- Bangladesh
Lists (4)
Sort Name ascending (A-Z)
Starred repositories
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
Living off the land searches for explorer and sharepoint
Network intruder and presence detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.
A tiny demo Android app using SSL pinning to block HTTPS MitM interception
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Creates shortcuts to virtually every special location or action built into Windows
fabric is an open-source framework for augmenting humans using AI. It provides a modular framework for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.
A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the contr…
Active Directory and Internal Pentest Cheatsheets
Easily and securely send things from one computer to another 🐊 📦
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
Chris Titus Tech's Windows Utility - Install Programs, Tweaks, Fixes, and Updates
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
Web simulation of Ubuntu 20.04, made using NEXT.js & tailwind CSS
Jupyter Notebooks for the Blue Team
This is a multi-use bash script for Linux systems to audit wireless networks.
A fancy self-hosted monitoring tool
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Windows x64 kernel mode rootkit process hollowing POC.
OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.
Docker files for hosting Pwn challenges,Web Challeges and Python Challenges in CTFs
Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.