Pinned Repositories
amazon-uk
awesome-yara
A curated list of awesome YARA rules, tools, and people.
AWS-Cognito-ATO
AWSGoat
AWSGoat : A Damn Vulnerable AWS Infrastructure
Book-Store
Book-Store
C0oki3s
Config files for my GitHub profile.
Capstone-Project
CTF-Writeups
ScribdT
ScribdT - Focused on Extracting Data from Scribd
ssrf
This is a Nodejs Module To prevent SSRF based attack's. Blocks request to Private IP and mitigate from further Bypass
C0oki3s's Repositories
C0oki3s/ScribdT
ScribdT - Focused on Extracting Data from Scribd
C0oki3s/ssrf
This is a Nodejs Module To prevent SSRF based attack's. Blocks request to Private IP and mitigate from further Bypass
C0oki3s/amazon-uk
C0oki3s/awesome-yara
A curated list of awesome YARA rules, tools, and people.
C0oki3s/AWS-Cognito-ATO
C0oki3s/AWSGoat
AWSGoat : A Damn Vulnerable AWS Infrastructure
C0oki3s/Book-Store
Book-Store
C0oki3s/C0oki3s
Config files for my GitHub profile.
C0oki3s/Capstone-Project
C0oki3s/CTF-Writeups
C0oki3s/Damn-Vulnerable-GraphQL-Application
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
C0oki3s/Golang
C0oki3s/image-upload-exploits
This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests and bug bounty.
C0oki3s/integration
C0oki3s/errsole.js
Node.js logger with a built-in dashboard
C0oki3s/install
C0oki3s/INTIGRITI
C0oki3s/kerchow
amplify your terminal for security research 🏎 🖥️
C0oki3s/rails_hacker
C0oki3s/RASEv1
Rooting Android Studio Emulator with Android Version 9.0 and above
C0oki3s/research
C0oki3s/rohith
C0oki3s/SaltStack
C0oki3s/SSLChecker
SSLChecker - Extracts issuer, common name (CN), and subject alternative names (SANs) from certificates.
C0oki3s/tools
C0oki3s/Tox
Testing Tox for CTF
C0oki3s/XXE-study
This repository contains various XXE labs set up for different languages and their different parsers. This may alternatively serve as a playground to teach or test with Vulnerability scanners / WAF rules / Secure Configuration settings.