nirajkharel's Stars
projectdiscovery/katana
A next-generation crawling and spidering framework.
madhuakula/kubernetes-goat
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
0xsyr0/Awesome-Cybersecurity-Handbooks
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
4ndersonLin/awesome-cloud-security
🛡️ Awesome Cloud Security Resources ⚔️
koutto/pi-pwnbox-rogueap
Homemade Pwnbox :rocket: / Rogue AP :satellite: based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap :bulb:
0xmaximus/Galaxy-Bugbounty-Checklist
Tips and Tutorials for Bug Bounty and also Penetration Tests.
dirkjanm/adidnsdump
Active Directory Integrated DNS dumping by any authenticated user
samratashok/ADModule
Microsoft signed ActiveDirectory PowerShell module
ricardojoserf/NativeDump
Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)
WesleyWong420/RedTeamOps-Havoc-101
Materials for the workshop "Red Team Ops: Havoc 101"
An0nUD4Y/Evilginx-Phishing-Infra-Setup
Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs
WesleyWong420/OPSEC-Tradecraft
Collection of OPSEC Tradecraft and TTPs for Red Team Operations
logicalhacking/DVHMA
Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.
zapstiko/Hacking-PDF
Here Are Some Popular Hacking PDF
Hrishikesh7665/Android-Pentesting-Checklist
Delve into a comprehensive checklist, your ultimate companion for Android app penetration testing. Identify vulnerabilities in network, data, storage, and permissions effortlessly. Boost security skills with essential tools and user-friendly guides. Elevate Android security seamlessly!
t3l3machus/pentest-pivoting
A compact guide to network pivoting for penetration testings / CTF challenges.
stolenusername/cowitness
CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to mimic an HTTP server and a DNS server, providing complete responses and valuable insights during your testing process.
0xStarlight/CRTE-Notes
Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.
WesleyWong420/Build-Your-Own-LOLBins
A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.
TheNittam/RPOscanner
Relative Path Overwrite Vulnerability Scanner
TheNittam/ReGen
ReGen is a utility tool simplifying Regex creation by selecting values from logs or text. It enhances efficiency for digital forensics, defense, validation, etc. Still in early stages, it aims to streamline Regex writing, boosting professionals' work efficiency.
TheNittam/Pass2Pwn
Pass2Pwn is a simple python3 tool created to assist penetration testers generate possible passwords for a targeted system based solely on the organization's name. Although Pass2Pwn does not have the capacity to generate as many passwords as other tools, I have attempted to implement a mechanism that generates passwords using the most common password pattern that we notice in general, which is correlated to the organization name.
prdp1137/huntPastebin
huntPastebin is a command-line tool that allows you to search for leaked information on the web using the psbdmp.ws API. It supports searching for domains, emails, or performing a general search.