Pinned Repositories
awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
ctf
CVE-2007-2447-in-Python
Python implementation of 'Username' map script' RCE Exploit for Samba 3.0.20 < 3.0.25rc3 (CVE-2007-2447).
dugisan3rd.github.io
DVWA
Damn Vulnerable Web Application (DVWA)
exploit
Exploit script for multiple CVE. Developed for hackthebox and penetration test
hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
OSCE-Exploit-Development
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
dugisan3rd's Repositories
dugisan3rd/awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
dugisan3rd/ctf
dugisan3rd/CVE-2007-2447-in-Python
Python implementation of 'Username' map script' RCE Exploit for Samba 3.0.20 < 3.0.25rc3 (CVE-2007-2447).
dugisan3rd/dugisan3rd.github.io
dugisan3rd/DVWA
Damn Vulnerable Web Application (DVWA)
dugisan3rd/exploit
Exploit script for multiple CVE. Developed for hackthebox and penetration test
dugisan3rd/hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
dugisan3rd/OSCE-Exploit-Development
dugisan3rd/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
dugisan3rd/privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
dugisan3rd/Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
dugisan3rd/RedTeam-Tactics-and-Techniques
Red Teaming Tactics and Techniques
dugisan3rd/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
dugisan3rd/windows-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合
dugisan3rd/Windows-Post-Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!