Solhack
As a #Top15youngeeks2022 nominee and a featured professional on builtinafrica.io, I am a highly skilled software developer and cyber-security practitioner.
South Africa
Pinned Repositories
74455-fancy-bear
AndroidMalwareSandbox
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
CodeWorkout
Covid-19 inspired Code training Repository for Python, Java, JavaScript And Angular Framework and some secure by design concepts and Clean code concepts
GkHack19
Abuse reporting app
Here-is-a-cookie
Wildcard removal
safehack18
TADHack2019
team-csi-platform
A platform for corporations to better identify communities where they can better put the CSI budget and notify communities of what the corporation's plan and how they will implement the investment
Team_CSI_platform
CTF challenge attack vectors
Solhack's Repositories
Solhack/74455-fancy-bear
Solhack/Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
Solhack/Here-is-a-cookie
Wildcard removal
Solhack/Assignment
Solhack/Ayoba.io
Solhack/ayobahack
Solhack/bingo
BINGO Android Game
Solhack/black-dashboard-angular
Solhack/BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
Solhack/Covid-19estimater-Andela
Andela Assessment Python Challenge
Solhack/Detecttions
Solhack/google-dorks-bug-bounty
A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting
Solhack/hashclash
Project HashClash - MD5 & SHA-1 cryptanalysis
Solhack/IDS_signiture_sniffer
Solhack/keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
Solhack/legalsmart
Solhack/LifeTsekeletsa
Solhack/misp-docker
MISP Docker (XME edition)
Solhack/OSCE-Complete-Guide
OSWE, OSEP, OSED
Solhack/phoneinfoga
Information gathering framework for phone numbers
Solhack/Ram-Musiq
Music website for a good friend of mine
Solhack/Red-Team-Management
Solhack/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
Solhack/reimagined-octo-guide
Solhack/Social-Coding-
Mobile IDE for Social Coding kids http://www.socialcodingsa.com/
Solhack/StaterKits
Solhack/symmetrical-carnival
Solhack/TshekeletsaBophelo
Solhack/VulnerableApp4APISecurity
Solhack/workshop-2021-learning-journey
Introduction and Workshop to GitHub Advance Security for Learning Journey (May 2021)