harekrishnarai
Product Security Engineer who is Passionate about securing applications through penetration testing and code reviews.
EntwicklersXINDIA
Pinned Repositories
100-days-of-OffSec
Hi everyone,
apk-downloader-from-cli
A Python Script for downloading apks from apkpure.com for testing and Android Pentesting.
Damn-vulnerable-sca
Damn Vulnerable SCA Application
kubernetes-on-aws
running kubernetes on aws with eks
p5.teach.js
A beginner friendly math animation library for p5.js
simple_calc
Simple Calculator made with basic Flutter Material UI
harekrishnarai's Repositories
harekrishnarai/Damn-vulnerable-sca
Damn Vulnerable SCA Application
harekrishnarai/100-days-of-OffSec
Hi everyone,
harekrishnarai/AI-JavaCoffeeShop
harekrishnarai/autoCV
clean CV LaTex template with GitHub Action that compiles and publishes new changes
harekrishnarai/awesome-aws-security
Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
harekrishnarai/awesome-devsecops
Curating the best DevSecOps resources and tooling.
harekrishnarai/Bug-Bounty-Wordlists
harekrishnarai/chatgpt-prompts-bug-bounty
ChatGPT Prompts for Bug Bounty & Pentesting
harekrishnarai/CrossInjector
Cross Injector — A Python Script for Cross-Site Scripting (XSS) Detection
harekrishnarai/DigiSpark-Scripts
USB Rubber Ducky type scripts written for the DigiSpark.
harekrishnarai/Do-It-Yourself-Web-Penetration-Testing
Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications
harekrishnarai/Fast-Google-Dorks-Scan
The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widespread file types and path traversal. The 100% automated.
harekrishnarai/hakoriginfinder
Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!
harekrishnarai/harekrishnarai
A Portfolio Type GitHub Special Repo
harekrishnarai/HBSQLI
Automated Tool for Testing Header Based Blind SQL Injection
harekrishnarai/JavaDocs
Documents and Materials _Java
harekrishnarai/JIRAya
JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and conducting tests.
harekrishnarai/js-finding
JS Finding can be used to extract JavaScript (JS) files from either a single domain URL or a list of domains. The tool supports various extraction methods and provides additional options for file download and wordlists creation.
harekrishnarai/Machine_Learning_CTF_Challenges
CTF challenges designed and implemented in machine learning applications
harekrishnarai/magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
harekrishnarai/malicious-dependencies
Demonstrates how a malicious dependency could negatively impact the build output.
harekrishnarai/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
harekrishnarai/n0kovo_subdomains
An extremely effective subdomain wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.
harekrishnarai/Offensivesecurity-Checklists
Checklists for Testing Security environment
harekrishnarai/OnBoard
💡 Follow 1,000 teenagers and their journey in making their first PCB
harekrishnarai/OSCP-Reporting
Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP Exam and Lab Reporting / Note-Taking Tool
harekrishnarai/secureum-mind_map
Central Repository for the Epoch 0 coursework and quizzes. Contains all the content, cross-referenced and linked.
harekrishnarai/Synergy-httpx
A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving content dynamically (e.g. payloads).
harekrishnarai/web-backend
web-frontend
harekrishnarai/xz-utils-vuln-checker
Checker for CVE-2024-3094 where malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code.