Pinned Repositories
0xsp-Mongoose
Privilege Escalation Enumeration Toolkit (ELF 64/32 ) , fast , intelligent enumeration with Web API integration . Mastering Your Own Finding
4deck
Forensics module for The Deck (pentesting and forensics distro for BeagleBoard/BeagleBone)
acwj
A Compiler Writing Journey
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Ginger-Chai
Ginger Chai crawls static and dynamic links provided within given url
IOCScraper
IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.
subdomain-enum
Subdomain Enumeration using Securitytrails API
ThreatFeedAutomater
Following script ingests the Threat Intel Feeds from input url list. Current script can fetch domains and IP Addresses.
vm
Package and Run Virtual Machines as Docker Containers
YaraIOCDownloader
This script will download IOCs based on the rule name defined in Yara rules and leverages abuse.ch API service to fetch the IOCs
chaitanyakrishna's Repositories
chaitanyakrishna/0xsp-Mongoose
Privilege Escalation Enumeration Toolkit (ELF 64/32 ) , fast , intelligent enumeration with Web API integration . Mastering Your Own Finding
chaitanyakrishna/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
chaitanyakrishna/AndrewSpecial
AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.
chaitanyakrishna/attck4fraud
Principles of MITRE ATT&CK in the fraud domain
chaitanyakrishna/awesome
:sunglasses: Curated list of awesome lists
chaitanyakrishna/Awesome-Asset-Discovery
List of Awesome Asset Discovery Resources
chaitanyakrishna/Awesome-Networking
A curated list of awesome networking libraries, resources and shiny things
chaitanyakrishna/awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
chaitanyakrishna/awesome-threat-detection
A curated list of awesome threat detection and hunting resources
chaitanyakrishna/beebug
A tool for checking exploitability
chaitanyakrishna/botsv1
chaitanyakrishna/Cheatsheet-God
Penetration Testing / OSCP Biggest Reference Bank / Cheatsheet
chaitanyakrishna/commix
Automated All-in-One OS command injection and exploitation tool.
chaitanyakrishna/DS_ML_Tutorial_NoteBooks_Jupyter
Data science and Machine Learning Jupyter Notebooks what i Practiced!!
chaitanyakrishna/hershell
Multiplatform reverse shell generator
chaitanyakrishna/keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
chaitanyakrishna/MISP
Access MISP via Web
chaitanyakrishna/Modlishka
Modlishka. Reverse Proxy. Phishing NG.
chaitanyakrishna/onionscan
OnionScan is a free and open source tool for investigating the Dark Web.
chaitanyakrishna/os-tutorial
How to create an OS from scratch
chaitanyakrishna/poc
Proof of Concepts
chaitanyakrishna/Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
chaitanyakrishna/Revoke-Obfuscation
PowerShell Obfuscation Detection Framework
chaitanyakrishna/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
chaitanyakrishna/SIEM
SIEM Tactics, Techiques, and Procedures
chaitanyakrishna/SPFAbuse
SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp
chaitanyakrishna/SpookFlare
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
chaitanyakrishna/stretcher
Tool designed to help identify open Elasticsearch servers that are exposing sensitive information
chaitanyakrishna/sysmon-modular
A repository of sysmon configuration modules
chaitanyakrishna/the-book-of-secret-knowledge
A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.