Pinned Repositories
2021-01-06
2021-01-20
Base63-ID-Generator
Generate the ID and increment it with the base-63.
CVE-2019-0841
PoC code for CVE-2019-0841 Privilege Escalation vulnerability
CVE-2019-0841-BYPASS
A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.
esptool
ESP8266 and ESP32 serial bootloader utility
ida-xtensa
IDAPython plugin for Tensilica Xtensa (as seen in ESP8266)
LzxToOabComplied
useful-scripts
Some usefull Scripts and Executables for Pentest & Forensics
bsrinivasguptha's Repositories
bsrinivasguptha/LzxToOabComplied
bsrinivasguptha/angular-electron
Ultra-fast bootstrapping with Angular and Electron (Typescript + SASS + Hot Reload) :speedboat:
bsrinivasguptha/breaking-and-pwning-apps-and-servers-aws-azure-training
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
bsrinivasguptha/chaos-public-program-list
Source for bug bounty programs available on Chaos website.
bsrinivasguptha/Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
bsrinivasguptha/CVE-2020-1206-POC
CVE-2020-1206 Uninitialized Kernel Memory Read POC
bsrinivasguptha/dnsteal
DNS Exfiltration tool for stealthily sending files over DNS requests.
bsrinivasguptha/donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
bsrinivasguptha/fuzzing
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
bsrinivasguptha/grafana
The tool for beautiful monitoring and metric analytics & dashboards for Graphite, InfluxDB & Prometheus & More
bsrinivasguptha/HELK
The Hunting ELK
bsrinivasguptha/Inveigh
Windows PowerShell ADIDNS/LLMNR/mDNS/NBNS spoofer/man-in-the-middle tool
bsrinivasguptha/lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
bsrinivasguptha/Mitigating-Web-Shells
Guidance for mitigation web shells. #nsacyber
bsrinivasguptha/OffensiveCSharp
Collection of Offensive C# Tooling
bsrinivasguptha/osquery
SQL powered operating system instrumentation, monitoring, and analytics.
bsrinivasguptha/pingcastle
PingCastle - Get Active Directory Security at 80% in 20% of the time
bsrinivasguptha/RedELK
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
bsrinivasguptha/ripgrep
ripgrep recursively searches directories for a regex pattern
bsrinivasguptha/ruler
A tool to abuse Exchange services
bsrinivasguptha/s23riu2
bsrinivasguptha/scratch
Repo with random useful scripts and utilities
bsrinivasguptha/SharpDllProxy
Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading
bsrinivasguptha/small
Smallest possible syntactically valid files of different types
bsrinivasguptha/sourcegraph
Universal code search (self-hosted)
bsrinivasguptha/spotter
Targeted Payload Execution
bsrinivasguptha/truffleHog
Searches through git repositories for high entropy strings and secrets, digging deep into commit history
bsrinivasguptha/tsunami-security-scanner
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
bsrinivasguptha/UACME
Defeating Windows User Account Control
bsrinivasguptha/Windows-Priviledge-Escalation-Resources
Compilation of Resources from TCM's Windows Priv Esc Udemy Course