Pinned Repositories
Android-Testing
Android Testing
archerysec
Open Source Vulnerability Assessment and Management helps developers and pentesters to perform scans and manage vulnerabilities.
Burp-Extentions
datasploit
A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitoring on the data.
EmailPermute-Rapportive
Creates Email permutations based upon the provided first name, middle name, last name and domain. Then these generated permutations are further verified using Rapportive.
Maltego-Transforms
Maltego Transforms, Machines and other extentions
NoSQLMap
Automated NoSQL database enumeration and web application exploitation tool.
Rapportive
Information gathering through Rapportive
REDHUNT
TweetMonitor
Keep an eye on specific keywords being posted on Twitter
SudhanshuC's Repositories
SudhanshuC/Maltego-Transforms
Maltego Transforms, Machines and other extentions
SudhanshuC/Android-Testing
Android Testing
SudhanshuC/Burp-Extentions
SudhanshuC/TweetMonitor
Keep an eye on specific keywords being posted on Twitter
SudhanshuC/archerysec
Open Source Vulnerability Assessment and Management helps developers and pentesters to perform scans and manage vulnerabilities.
SudhanshuC/EmailPermute-Rapportive
Creates Email permutations based upon the provided first name, middle name, last name and domain. Then these generated permutations are further verified using Rapportive.
SudhanshuC/datasploit
A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitoring on the data.
SudhanshuC/NoSQLMap
Automated NoSQL database enumeration and web application exploitation tool.
SudhanshuC/Rapportive
Information gathering through Rapportive
SudhanshuC/REDHUNT
SudhanshuC/BIU-Hackathon
SudhanshuC/killasa
CVE-2016-1287 vulnerability test
SudhanshuC/mal
SudhanshuC/MS17-010
MS17-010
SudhanshuC/physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.
SudhanshuC/CrackMapExec
A swiss army knife for pentesting Windows/Active Directory environments
SudhanshuC/dnsftp
Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.
SudhanshuC/DotNetToJScript
A tool to create a JScript file which loads a .NET v2 assembly from memory.
SudhanshuC/edimax-br-6528n
Mirror of the downloadable firmware for the Edimax BR-6528N Nano wireless router (as at Feb 6th, 2013—v1.10?)
SudhanshuC/inetdata
Internet data acquisition
SudhanshuC/LinEnum
Scripted Local Linux Enumeration & Privilege Escalation Checks
SudhanshuC/NTLMBrute
A NTLM bruteforce python script.
SudhanshuC/PowerOPS
PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell "easier"
SudhanshuC/ShellcodeExec-Python
SudhanshuC/tinyproxy
tinyproxy - a light-weight HTTP/HTTPS proxy daemon for POSIX operating systems