Sakib-Haque-Zisan
Cyber Security Researcher । Pentester। Engineer। Mentor। Chief of Team - Bengal Black Diamond 'Gray Hat Hacker's Community
Byte Capsule Ltd.Rajshahi
Pinned Repositories
Automate-Video-Downloader
By using this code you can easily download any video automatically.
automate_subtake
BurpSuite-For-Pentester
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".
Computer-forensics
The best tools and resources for forensic analysis.
facebook.py
Guide-CEH-Practical-Master
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Portfolio-of-Sakib-Haque-Zisan
Python_Keylogger
A keylogger is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. In this tutorial, you will learn how to write a keylogger in Python. You are maybe wondering, why a keylogger is useful ? Well, when a hacker (or a script kiddie) uses this for unethical purposes, he/she will register everything you type in the keyboard including your credentials (credit card numbers, passwords, etc.). The goal of this tutorial is to make you aware of these kind of scripts as well as learning how to implement such malicious scripts on your own for educational purposes, let's get started!
Sakib-Haque-Zisan
Sakib-Haque-Zisan's Repositories
Sakib-Haque-Zisan/Automate-Video-Downloader
By using this code you can easily download any video automatically.
Sakib-Haque-Zisan/ATM-Machine-by-PythOn
I've created the project of Automated Teller Machine using Python.
Sakib-Haque-Zisan/breach-parse
A tool for parsing breached passwords
Sakib-Haque-Zisan/Fizzbuzz-Challenge
There is a game called Fizzbuzz. Basically, there are two players & there are two constructive numbers. So, I've solved the problem here in C++.
Sakib-Haque-Zisan/Leaked-Virus
I’ve designed the app with different kinds of algorithms and used the code of Trojan Horse which is one kind of Malware virus. The app is well secured to use and that doesn’t access the users data. The user can edit his/her images by connecting the internet through the app. The user have to follow the instructions to edit the images: Sign in by using the phone number. Select any kind of photo to edit. Save the photo in the device. Share the picture with the person who is interested to receive your personal photos. I’ve coded the app in malicious code that looks legitimate but can damage, disrupt and inflict some logical actions which might be harmful for some types of images like Nudes. The virus which is designed in the app acts like a bona fide application to trick the nasty person.
Sakib-Haque-Zisan/MKBHD-Challenge
Marques uploaded a video this year where he and his team manually uploaded and downloaded video to YouTube 1000 times to test the quality drop. Here I've automated this using Python.
Sakib-Haque-Zisan/Multiple-Calculator-in-Java
In this project I've created a Multiple Calculator using Java in Netbeans.