Pinned Repositories
50M_CTF_Writeup
$50 Million CTF from Hackerone - Writeup
90DaysOfCyberSecurity
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md
Absinthe
A Blind SQL Exploitation application
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
AllThingsSSRF
This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location
D-TECT
# D-TECT D-TECT - Pentest the Modern Web Author: [Shawar Khan] (https://shawarkhan.com/about/) Disclaimer: I am not responsible for any damage done using this tool. This tool should only be used for educational purposes and for penetration testing. ###Compatibility: * Any platform using Python 2.7 ###Requirements: * Python 2.7 * Modules(included): Colorama, BeautifulSoup ###Description: **D-TECT** is an All-In-One Tool for Penetration Testing. This is specially programmed for Penetration Testers and Security Researchers to make their job easier, instead of launching different tools for performing different task. **D-TECT** provides multiple features and detection features which gather target information and finds different flaws in it. ###Features: * Sub-domain Scanning * Port Scanning * Wordpress Scanning * Wordpress Username Enumeration * Wordpress Backup Grabbing * Sensitive File Detection * Same-Site Scripting Scanning * Click Jacking Detection * Powerful XSS vulnerability scanning * SQL Injection vulnerability scanning * User-Friendly UI ###Usage: python d-tect.py #Screenshots: ###Menu: ![Menu](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/menu.png) ###Banner Grabbing: ![Banner Grabbing](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/banner.png) ###Click Jacking Detection: ![Click Jacking](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/clickjacking.png) ###Port Scanner: ![Port Scanner](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/portscan.png) ###WP Backup Grabber: ![WP Backup Grabber](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/backup.png) ###Sensitive File Detection: ![File Detection](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/filedetection.png) ###Cross-Site Scripting [ XSS ] Scanner: ![XSS Scanner](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/xss.png) ###SQL Injection [ SQLI ] Scanner: ![SQLI Scanner](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/sqli.png) ###Sub-domain Scanner: ![Sub-Domain Scanner](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/subdomain.png) ###WP Username Enumeration: ![WP Username Enumeration](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/usernameenumeration.png) ###Same Site Scripting detection: ![Same-Site Scripting](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/samesitescripting.jpeg) # Special Thanks To: * Curt Smith * Tayyab Qadir * Mugees Ahmad
eJPT-2
Lab solutions and commands from studying for the eLearnSecurity Junior Penetration Tester certificate.
PENTESTING-BIBLE
This repository was created and developed by Ammar Amer @cry__pto Only. Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
Devendrasuthar's Repositories
Devendrasuthar/90DaysOfCyberSecurity
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md
Devendrasuthar/Awesome-GPT-Agents
A curated list of GPT agents for cybersecurity
Devendrasuthar/awesome-security-newsletters
Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attacks
Devendrasuthar/awesome-yara
A curated list of awesome YARA rules, tools, and people.
Devendrasuthar/Azure-Sentinel
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Devendrasuthar/BlackFriday-GPTs-Prompts
List of free GPTs that doesn't require plus subscription
Devendrasuthar/BurpSuiteInstaller
Install and Activate your Burp Suite Professional with ase.
Devendrasuthar/detection-rules
Rules for Elastic Security's detection engine
Devendrasuthar/EDR-Telemetry
This project aims to compare and evaluate the telemetry of various EDR products.
Devendrasuthar/FoodPanda-food-app
This project is a Swiggy clone . I used Swiggy live API through CORS . Redux toolkit , context , router , lazy loading & many more functionalities added 🚀.
Devendrasuthar/GOAD
game of active directory
Devendrasuthar/hackerone-reports
Top disclosed reports from HackerOne
Devendrasuthar/InfoSecLibrary
Welcome to InfoSecLibrary – Your comprehensive resource hub for cybersecurity enthusiasts! Explore a curated collection of PDFs covering penetration testing, network security, ethical hacking, and more. Enhance your knowledge in the ever-evolving world of information security.
Devendrasuthar/Leaked-GPTs
Leaked GPTs Prompts Bypass the 25 message limit or to try out GPTs without a Plus subscription.
Devendrasuthar/MISP
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Devendrasuthar/Notes
Devendrasuthar/ocd-mindmaps
Orange Cyberdefense mindmaps
Devendrasuthar/OSCP
OSCP Cheat Sheet
Devendrasuthar/OSCP-Cheatsheet
OSCP Cheatsheet by Sai Sathvik
Devendrasuthar/panther-analysis
Built-in Panther detection rules and policies
Devendrasuthar/Penetration-List
Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. Includes payloads, dorks, fuzzing materials, and offers in-depth theory sections. Visit our Medium profile for more information.
Devendrasuthar/PentestGPT
A GPT-empowered penetration testing tool
Devendrasuthar/RedCloud-OS
RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers (CSPs)
Devendrasuthar/RedTeam-Scripts
Devendrasuthar/sigma
Main Rule Repository
Devendrasuthar/SplunkUsecase
Devendrasuthar/Threat-Hunting-With-Splunk
Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise
Devendrasuthar/vulnerability-Checklist
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
Devendrasuthar/wappalyzer
Identify technology on websites.
Devendrasuthar/yara
The pattern matching swiss knife