Pinned Repositories
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Active-directory-small-cheatsheet
Small easy to find cheat sheet for Active directory exploitation
AWScli-exploitation-cheatsheet
DVWA-Bruteforce-high-security-solutions
Contains scripts or DVWA write ups for high security mode
HTB-writeup-download
HTB writeup downloader
mimikatz
A little tool to play with Windows security
Oscp-Cheat-Sheet
wew oscp
phplist-docker
Sentrifugo-vulnerable-docker
UAC-Bypass
A shot code to Bypass UAC in Windows.
avi7611's Repositories
avi7611/Oscp-Cheat-Sheet
wew oscp
avi7611/Active-directory-small-cheatsheet
Small easy to find cheat sheet for Active directory exploitation
avi7611/UAC-Bypass
A shot code to Bypass UAC in Windows.
avi7611/HTB-writeup-download
HTB writeup downloader
avi7611/Sentrifugo-vulnerable-docker
avi7611/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
avi7611/AWScli-exploitation-cheatsheet
avi7611/phplist-docker
avi7611/DVWA-Bruteforce-high-security-solutions
Contains scripts or DVWA write ups for high security mode
avi7611/mimikatz
A little tool to play with Windows security
avi7611/ModSecurity
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx that is developed by Trustwave's SpiderLabs. It has a robust event-based programming language which provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analysis. With over 10,000 deployments world-wide, ModSecurity is the most widely deployed WAF in existence.
avi7611/modsecurity-corerule3.3.0-docker
avi7611/modsecurity-docker
The official ModSecurity Docker images
avi7611/private
avi7611/PyCrypto
Simple AES Encryption and Decryption system using Python
avi7611/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.