Pinned Repositories
Active-Directory-Recon
Enumeration from a non-domain joined Windows computer
AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
awesome-bugbounty-tools
A curated list of various bug bounty tools
awesome-web-security
🐶 A curated list of Web Security materials and resources.
Cloud-Security-Attacks
Azure and AWS Attacks
CTF-Writeups
This repo contains solution for ctf challenges
cve-maker
Tool to find CVEs and Exploits.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
ikpehlivan's Repositories
ikpehlivan/cve-maker
Tool to find CVEs and Exploits.
ikpehlivan/awesome-iot-and-hardware-security
A collection of awesome tools, books, resources, software, documents and cool stuff about IoT and HW security.
ikpehlivan/CVE-2023-6875
CVE-2023-6875 PoC
ikpehlivan/CVE-2024-23897
CVE-2024-23897
ikpehlivan/nipejs
Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leaks.
ikpehlivan/0up
0up is a zero-knowledge, open-source, encrypted file sharing service
ikpehlivan/AzureAD-Attack-Defense
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
ikpehlivan/caldera
Automated Adversary Emulation Platform
ikpehlivan/Checkmate
payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter
ikpehlivan/CVE-2024-20698
Analysis of the vulnerability
ikpehlivan/CVE-2024-25600
Unauthenticated Remote Code Execution – Bricks <= 1.9.6
ikpehlivan/D3m0n1z3dShell
Demonized Shell is an Advanced Tool for persistence in linux.
ikpehlivan/DraculaOS
Dracula OS is a Linux operating system meticulously designed for OSINT (Open Source Intelligence) and Cyber Intelligence missions.
ikpehlivan/ghauri
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
ikpehlivan/Moriarty
ikpehlivan/nim-shell
Reverse shell that can bypass windows defender detection
ikpehlivan/Nuclei-Templates-Collection
Nuclei Templates Collection
ikpehlivan/Offensive-OSINT-Tools
OffSec OSINT Pentest/RedTeam Tools
ikpehlivan/OneForAll
OneForAll是一款功能强大的子域收集工具
ikpehlivan/PacketSpy
PacketSpy
ikpehlivan/Pantheon
Insecure Camera Parsing and Intelligence
ikpehlivan/proctools
Small toolkit for extracting information and dumping sensitive strings from Windows processes
ikpehlivan/PurpleLab
PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules, simulate logs, and undertake various security tasks, all accessible through a user-friendly web interface
ikpehlivan/pwn_jenkins
Notes about attacking Jenkins servers
ikpehlivan/toxicache
Go scanner to find web cache poisoning vulnerabilities in a list of URLs
ikpehlivan/Ultimate-RAT-Collection
For educational purposes only, samples of old & new malware builders including screenshots!
ikpehlivan/wazuh
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
ikpehlivan/Wazuh-Rules
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
ikpehlivan/webcopilot
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.
ikpehlivan/Xiaomi-HyperOS-BootLoader-Bypass
A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings.