azwisec
Aswin Govind | Application Security Consultant | Bug Bounty Hunter | Web App Penetration Testing Trainer | Indian https://www.youtube.com/c/Hackerala
NullKerala,India
Pinned Repositories
azwi
BROKENLINKCheck.md
Bug-Bounty-Reporting-Templates
Report Templates One of the most important elements of running a successful bug bounty program, is ensuring you get high quality reports. Report templates help to ensure that hackers provide you with all of the information you need to verify and validate the report. Instead of the report submission form being an empty white box where the hacker has to remember to submit the right details, a report template can prompt them with the details you need. With report templates, you create a Markdown powered template, and when a hacker submits a new report, the template is pre-loaded, which can then request certain types of information.
cj
crt.sh
Free_Labs
IDOR
iOT_Security_1001
IoT security refers to the measures taken to protect internet-connected devices and networks from unauthorized access, data breaches, and cyber attacks. It involves securing both the hardware and software components of IoT devices, as well as the communication channels between devices and backend systems.
linuxpriv
Linux Privilege Escalation Resourses. Aswin Govind Aswin Govind Sep 8·1 min read Linux Privilege Escalation tactics and techniques Resourses designed to help you improve your privilege escalation game. Links and Resourses: Enjoy 😃 https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md list of Unix binaries https://gtfobins.github.io/ https://book.hacktricks.xyz/linux-unix/privilege-escalation https://sushant747.gitbooks.io/total-oscp-guide/content/privilege_escalation_-_linux.html LD_Preload https://www.hackingarticles.in/linux-privilege-escalation-using-ld_preload/ Spawn Shell https://netsec.ws/?p=337 Tools LinPEAS https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS LinEnum https://github.com/rebootuser/LinEnum Linux-Exploit-Suggester https://github.com/mzet-/linux-exploit-suggester Linux-Priv-Checker https://github.com/sleventyeleven/linuxprivchecker Exploits https://www.exploit-db.com/ Machines https://tryhackme.com/room/vulnversity https://tryhackme.com/room/cmess https://tryhackme.com/room/lazyadmin https://tryhackme.com/room/anonymous https://tryhackme.com/room/tomghost https://tryhackme.com/room/convertmyvideo Thank You.
Pentesting
Will Add
azwisec's Repositories
azwisec/Free_Labs
azwisec/linuxpriv
Linux Privilege Escalation Resourses. Aswin Govind Aswin Govind Sep 8·1 min read Linux Privilege Escalation tactics and techniques Resourses designed to help you improve your privilege escalation game. Links and Resourses: Enjoy 😃 https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md list of Unix binaries https://gtfobins.github.io/ https://book.hacktricks.xyz/linux-unix/privilege-escalation https://sushant747.gitbooks.io/total-oscp-guide/content/privilege_escalation_-_linux.html LD_Preload https://www.hackingarticles.in/linux-privilege-escalation-using-ld_preload/ Spawn Shell https://netsec.ws/?p=337 Tools LinPEAS https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS LinEnum https://github.com/rebootuser/LinEnum Linux-Exploit-Suggester https://github.com/mzet-/linux-exploit-suggester Linux-Priv-Checker https://github.com/sleventyeleven/linuxprivchecker Exploits https://www.exploit-db.com/ Machines https://tryhackme.com/room/vulnversity https://tryhackme.com/room/cmess https://tryhackme.com/room/lazyadmin https://tryhackme.com/room/anonymous https://tryhackme.com/room/tomghost https://tryhackme.com/room/convertmyvideo Thank You.
azwisec/Bug-Bounty-Reporting-Templates
Report Templates One of the most important elements of running a successful bug bounty program, is ensuring you get high quality reports. Report templates help to ensure that hackers provide you with all of the information you need to verify and validate the report. Instead of the report submission form being an empty white box where the hacker has to remember to submit the right details, a report template can prompt them with the details you need. With report templates, you create a Markdown powered template, and when a hacker submits a new report, the template is pre-loaded, which can then request certain types of information.
azwisec/azwi
azwisec/BROKENLINKCheck.md
azwisec/cj
azwisec/crt.sh
azwisec/IDOR
azwisec/iOT_Security_1001
IoT security refers to the measures taken to protect internet-connected devices and networks from unauthorized access, data breaches, and cyber attacks. It involves securing both the hardware and software components of IoT devices, as well as the communication channels between devices and backend systems.
azwisec/ol
azwisec/privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
azwisec/Pentesting
Will Add
azwisec/aswingovind
azwisec/AWSGoat
AWSGoat : A Damn Vulnerable AWS Infrastructure
azwisec/loginctf
azwisec/OWASP-TOP-101
This is not Official Group of OWASP This is a discussussion group for Bug Hunters and Web application Testers. No Politics No Relegious Talk Disscussion Topics anything Related to Bug Bounty and Web/Mob Application Testing and Cyber security t.me/owasp101
azwisec/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
azwisec/portswigger-accademy
The Web Security Academy is a free online training center for web application security. It includes content from PortSwigger's in-house research team, experienced academics.
azwisec/security-study-plan
Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...
azwisec/top25-parameter
For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
azwisec/wstg
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
azwisec/www-project-top-ten
OWASP Foundation Web Respository