jaishan
Aim for 1337, Enjoy Pentesting and Forensic at home. Job Demands all other factors of cyber domain. ICS/OT to CLOUD to AI LLM.
Pinned Repositories
2FAssassin
Bypass Two-Factor-Authentication
Active-directory-JITU
Active directory in nutshell
APT06202001
Applied Purple Teaming - Infrastructure, Threat Optics, and Continious Improvement - June 6, 2020
APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
APTnotes
Various public documents, whitepapers and articles about APT campaigns
atomic-red-team
Small and highly portable detection tests.
awesome-devsecops
An authoritative list of awesome devsecops tools with the help from community experiments and contributions.
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Awesome-Hacking-Resources
A collection of hacking / penetration testing resources to make you better!
Pingshell-script-
a Bash script that pings all IP addresses in the 192.168.110.0/24 subnet and prompts you for the active and up ones:
jaishan's Repositories
jaishan/Active-directory-JITU
Active directory in nutshell
jaishan/APT06202001
Applied Purple Teaming - Infrastructure, Threat Optics, and Continious Improvement - June 6, 2020
jaishan/Pingshell-script-
a Bash script that pings all IP addresses in the 192.168.110.0/24 subnet and prompts you for the active and up ones:
jaishan/BackupOperatorToolkit
The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin
jaishan/BlackLotus
BlackLotus UEFI Windows Bootkit
jaishan/Blue-Teamer
Blue teamer tools and techniques
jaishan/chisel
A fast TCP tunnel over HTTP
jaishan/cybersec.github.io
Cyber Sec working on domains of it.
jaishan/dns-exfiltration
Notes and custom scripts for DNS exfiltration
jaishan/eng-practices
Google's Engineering Practices documentation
jaishan/GyoiThon
GyoiThon is a growing penetration test tool using Machine Learning.
jaishan/HulkypapaEnum
Below is a Python script that mimics some of the functionality of nmap. I’ve named it HULKYPAPA-ENUM
jaishan/ICS-Security-Study-Resources
A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.
jaishan/K8tools
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
jaishan/LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
jaishan/netlas-cookbook
The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make the most of Netlas.io.
jaishan/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
jaishan/Pentesting-Bugbounty
Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to Infosec community.
jaishan/playbooks
Phantom Orchestration Playbooks
jaishan/public-pentesting-reports
Curated list of public penetration test reports released by several consulting firms and academic security groups
jaishan/pynetdicom3
A Python 2.7/3.4+ implementation of the DICOM networking protocol
jaishan/randomrepo
Repo for random stuff
jaishan/ReconAIzer
A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomains and more!
jaishan/reconspider
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
jaishan/Red-Teamer
Red Teaming tools and techniques
jaishan/ROPgadget
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
jaishan/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
jaishan/SF2---Destroying-signature-antiviruses
Antivirus Signature Search Toolkit
jaishan/UltimateAppLockerByPassList
The goal of this repository is to document the most common techniques to bypass AppLocker.
jaishan/vulnerability-Checklist
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter