Pinned Repositories
888
AIO-Pentesting
All in one Pentest methodologies - Tools and commands
Aircrack-ng-handbook
Everything useful about Aircrack-ng
CVE-2021-4045
TP-Link Tapo c200 ver <1.1.15 - Remote Code Execution (RCE)
DTG-Src
Advanced fully requests discord token generator
onebytex's Repositories
onebytex/CVE-2021-4045
TP-Link Tapo c200 ver <1.1.15 - Remote Code Execution (RCE)
onebytex/DTG-Src
Advanced fully requests discord token generator
onebytex/888
onebytex/AIO-Pentesting
All in one Pentest methodologies - Tools and commands
onebytex/Aircrack-ng-handbook
Everything useful about Aircrack-ng
onebytex/Awesome-Cybersecurity-Handbooks
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
onebytex/CVE-2021-40444
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
onebytex/CVE-2022-30190
onebytex/CVE-2022-34265
PoC for CVE-2022-34265 (Django)
onebytex/dep-scan
Fully open-source security audit for project dependencies based on known vulnerabilities and advisories. Supports both local repos and container images. Integrates with various CI environments such as Azure Pipelines, CircleCI, Google CloudBuild. No server required!
onebytex/F-Tool
F-Tool the simple tool you need :)
onebytex/Guide-CEH-Practical-Master
onebytex/hackerone-reports
Top disclosed reports from HackerOne
onebytex/HiddenDesktop
HVNC for Cobalt Strike
onebytex/hoaxshell
An unconventional Windows reverse shell, currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic.
onebytex/HtmlSmuggling
HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the payload on the targeted device when the victim opens/clicks the HTML attachment/link. The HTML smuggling technique leverages legitimate HTML5 and JavaScript features to hide malicious payloads and evade security detections. The HTML smuggling method is highly evasive. It could bypass standard perimeter security controls like web proxies and email gateways, which only check for suspicious attachments like EXE, DLL, ZIP, RAR, DOCX or PDF
onebytex/Info-Sec-Dork-List
Ultimate Google Dork Lists OSWP top 10
onebytex/learn-regex
Learn regex the easy way
onebytex/Mass-exploit-CVE-2022-29464
Mass Exploit for CVE 2022-29464 on Carbon
onebytex/onebytex
onebytex/OSCP
OSCP Guide
onebytex/Pentest-Tools
onebytex/PSSW100AVB
A list of useful Powershell scripts with 100% AV bypass (At the time of publication).
onebytex/TryHackMe-CTF
TryHackMe CTF writeups
onebytex/week4update