YOUNE-S's Stars
expressjs/express
Fast, unopinionated, minimalist web framework for node.
screetsec/TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
BishopFox/sliver
Adversary Emulation Framework
frohoff/ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Ignitetechnologies/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
ihebski/DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
GhostPack/Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
hahwul/dalfox
🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.
lanjelot/patator
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
pwntester/ysoserial.net
Deserialization payload generator for a variety of .NET formatters
r0oth3x49/ghauri
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
ropnop/kerbrute
A tool to perform Kerberos pre-auth bruteforcing
sa7mon/S3Scanner
Scan for misconfigured S3 buckets across S3-compatible APIs!
infosec-au/altdns
Generates permutations, alterations and mutations of subdomains and then resolves them
SnaffCon/Snaffler
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
DanMcInerney/net-creds
Sniffs sensitive data from interface or pcap
mitchellkrogza/Phishing.Database
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
SerpicoProject/Serpico
SimplE RePort wrIting and COllaboration tool
RhinoSecurityLabs/IPRotate_Burp_Extension
Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
m3n0sd0n4ld/uDork
uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or directories, find IoT devices, detect versions of web applications, and so on.
socfortress/Wazuh-Rules
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
esidate/pentesting-active-directory
Active Directory pentesting mind map
Tejas1510/Hacking-Scripts
Hacking Scripts contains amazing and awesome scripts written in Python, JavaScript, Java, Nodejs, and more. The main aim of the repository will be to provide utility scripts that might make everyday life easy.
htmercury/Cpp-Keylogger
Advanced keylogger made in C++ that works on Window 7, 8, 8.1, And 10 - Use at your own discretion
aimadnet/twttrapi-python
TwttrAPI Python - Unofficial Twitter API
charlesbel/Evilginx2-Phishlets
Many Evilginx2 Phishlets Uptodate
soufianetahiri/Leaked-Password
A database containing 22409485 clear and equivalent sha256 hash passwords
Abhinandan-Khurana/MY-CRTP-Notes
This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.
sharvita/CPU-Scheduling-
The primary goal of this lab assignment is to understand various CPU scheduling algorithms, gain some experience building a simulator for CPU scheduling algorithm and to evaluate their performances. Requirements Programming language: You must use either C or C++ to develop your program. Running Environment: Your program should be compiled at CSEGRID and be able to be tested without errors. The implementation details Write a program to simulate a CPU scheduler which selects a process from a ready queue and executes the process by using the given scheduling algorithm, display its actives and evaluate its performance based on measurements such as average turn-around time, average waiting time, and total number of context switching. When a process is scheduled, the simulator will simply print what the process is running at what time, collecting data and producing Gantt Chart-like outputs. Specifications You have to implement FCFS (First Come First Serve), SRTF (Shortest Remaining Task First – preemptive), and RR (Round Robin) scheduling algorithms. Assumptions Use the following assumptions when you design and implement your CPU simulator. There is only one CPU All processes perform only CPU operations. All processes have the same priority. The newly arrived process is directly added to the back of the ready queue. We use only ready queue for this simulation. Context switching is done in 0 ms. Context switch is performed only when a current process is moved to the back of ready queue. All time are given milliseconds. Use FCFS policy for breaking the tie. Measurements and Evolution You program should collect the following information about each process: Time of completion Waiting time Turn around time No. of Context Switching You program should calculate the following information using the collected data: Average CPU burst time Average waiting time Average turn around time Average response time Total number of Context Switching performed Simulator Input Process information (assume a maximum of 100 processes) will be read from a text file. The information for each process will include the following fields: pid: a unique numeric process ID. arrival time: arrival time for a process in ms. CPU burst time: the CPU time requested by a processes
ilanfink/openmp-multithreading
Use of openmp library in C++ to create multiple thread array addition with output for proof of concept