MrHr6874
Masters Computer Science (Focus on Cyber Security) | Tech Enthusiast | Innovative thinker | Bug Bounty Hunter
Germany
Pinned Repositories
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
AllThingsSSRF
This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location
Benchmark
OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools.
bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
container-security-checklist
Checklist for container security - devsecops practices
dependency-track
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
GSH-WEBUI
Updated
GSIH-WEB-UI
Web application UI for Gujarat Smart India Hackathon
Hackathonproject
Writeups
MrHr6874's Repositories
MrHr6874/AllThingsSSRF
This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location
MrHr6874/GSIH-WEB-UI
Web application UI for Gujarat Smart India Hackathon
MrHr6874/Writeups
MrHr6874/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
MrHr6874/Benchmark
OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools.
MrHr6874/bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
MrHr6874/container-security-checklist
Checklist for container security - devsecops practices
MrHr6874/dependency-track
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
MrHr6874/GSH-WEBUI
Updated
MrHr6874/Hackathonproject
MrHr6874/HacktivityconCTF
MrHr6874/HelloTF
Getting started with TF
MrHr6874/https-github.com-EmpireProject-Empire
MrHr6874/Infosec-Project
This is the project I have done to illustrate the usage of sqlmap in finding vulnerable parameters in a website, it uses a method of Parameter Tampering
MrHr6874/MrHr6874
MrHr6874/PowerShell-AD-Recon
PowerShell Scripts I find useful
MrHr6874/Priv2Admin
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
MrHr6874/python-registry
Pure Python parser for Windows Registry hives.
MrHr6874/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
MrHr6874/shiftleft-java-demo
MrHr6874/vanta
Animated 3D backgrounds for your website
MrHr6874/wordlist
Collection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passwords.