dhaneshsivasamy07's Stars
bregman-arie/devops-exercises
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
bregman-arie/devops-resources
DevOps resources - Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP
ihebski/DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
madhuakula/kubernetes-goat
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
fullhunt/log4j-scan
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
0dayCTF/reverse-shell-generator
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
imran-parray/Mind-Maps
Mind-Maps of Several Things
lefayjey/linWinPwn
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
parsiya/Hacking-with-Go
Golang for Security Professionals
WADComs/WADComs.github.io
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
denisse-dev/dotfiles
:dragon_face: My Arch Linux config [i3-gaps + i3blocks + Zsh + Spacemacs + Rofi + Alacritty + Neofetch]
tihanyin/PSSW100AVB
A list of useful Powershell scripts with 100% AV bypass (At the time of publication).
pimps/JNDI-Exploit-Kit
JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps vulnerable to JNDI Injection)
mgeeky/ProtectMyTooling
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it with your implant, it does a lot of sneaky things and spits out obfuscated executable.
bats3c/ADCSPwn
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
FatRodzianko/SharpBypassUAC
C# tool for UAC bypasses
takito1812/log4j-detect
Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading
dirkjanm/forest-trust-tools
Proof-of-concept tools for my AD Forest trust research
alexandre-lavoie/python-log4rce
An All-In-One Pure Python PoC for CVE-2021-44228
trickest/mkpath
Make URL path combinations using a wordlist
bayufedra/Tiny-PHP-Webshell
several list of simple and obfuscate PHP shell
rishitsaiya/CTFlearn-Writeups
CTFlearn writeups of all the challenges I have solved. It covers all the domains including Cryptography, Forensics, Reversing, Pwning and other Misc problems.
mgeeky/Exploit-Development-Tools
A bunch of my exploit development helper tools, collected in one place.
xct/hashgrab
generate payloads that force authentication against an attacker machine
archcloudlabs/BSidesRoc2022_Linux_Malware_Analysis_Course
BSidesRoc 2022 Linux Malware/Forensics Course
nowsecure/frida-screenshot
Grab screenshots using Frida.
cygenta/top10million
A repository of the 10 million live most popular websites
Muhammd/Awesome-Payloads
apapedulimu/Learn-Source-Code-Review
Learning source code review, spot vulnerability, find some ways how to fix it.
Crypto-Cat/REdiREKT
Code-base to go with academic paper "REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic" available @ https://pure.qub.ac.uk/en/publications/redirekt-extracting-malicious-redirections-from-exploit-kit-traff and short video presentation and tool demo here: https://www.youtube.com/watch?v=DIXRouNfq6E