bikashdash
कर्मण्येवाधिकारस्ते मा फलेषु कदाचन। मा कर्मफलहेतुर्भूर्मा ते सङ्गोऽस्त्वकर्मणि॥ Vulnerability Research 《》Exploitation 《》0Day 《》Reverse Engineering
@VulnerableGhost NT AUTHORITY\SYSTEM
Pinned Repositories
0day-security-software-vulnerability-analysis-technology
0day-security-software-vulnerability-analysis-technology
ASLR-R4nd0mness-Ch3ck
This project will specifically retrive the randomness of ASLR implimentation in a Programm.Basically Idea is to find common vulnerability in ASLR implimentation And Exploit them
Axis_Vuln_Webcam
This particular .NSE will find vulnerable Axis webcam and exploit
browsersploit
BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal computers.
fuzzer
A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full details.
KdExploitMe
A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.
Kernel-exploit_2.4.22-version
Linux Kernel 2.4.22 kernel Buffer overflow vulnerabilities and exploit
l0l
The Exploit Development Kit
windows-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合
API_Monitoring
This Application will monitor the Malicious API calls in the system infected with malware by monitoring APIs
bikashdash's Repositories
bikashdash/radamsa
a general-purpose fuzzer
bikashdash/shadowbroker
The Shadow Brokers "Lost In Translation" leak
bikashdash/EquationGroupLeak
Archive of leaked Equation Group materials
bikashdash/linux-kernel-exploitation
A bunch of links related to Linux kernel fuzzing and exploitation
bikashdash/demos
Demos of various injection techniques found in malware
bikashdash/PoC
Various PoCs
bikashdash/metasploit-framework
Metasploit Framework
bikashdash/reverse-engineering
List of awesome reverse engineering resources
bikashdash/ExploitKit
Exploitkit
bikashdash/fuzzer
A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full details.
bikashdash/wiiuhaxx_common
ROP-chain-generator for Wii U PowerPC-userland exploits.
bikashdash/wiiu_browserhax_fright
Wii U libstagefright exploits.
bikashdash/Python_Emulator
Python Emulation And Detection of Shellcode based on Pylibemu package
bikashdash/Kernel-exploit_2.4.22-version
Linux Kernel 2.4.22 kernel Buffer overflow vulnerabilities and exploit
bikashdash/DemonHunter_Exploitkit
Source code to the Malicious Demon Hunter Exploit Kit
bikashdash/Axis_Vuln_Webcam
This particular .NSE will find vulnerable Axis webcam and exploit
bikashdash/KdExploitMe
A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.
bikashdash/Maltego
bikashdash/Customburpextension
This is a custom burp extension that can be used during Web Application Security Asseesment and Penetration Testing.First download the burp extender from burpsuite official website and import java classes using eclipse ide or something like that.after that write your code like below into the that java classes.After creating test that by Burp Suite