Pinned Repositories
AbuseIP-Checker
Check Malicious Status Of An IP Address List Using AbuseIP Database
asdasdadasd
asdasdasd
backupHunter
With backupHunter, you can create every possible permutation of possible backup names and brute force targets for backup files containing juicy information.
BitSecurity-LFIFinder
Using This Powerfull Tool, You Can Automate Finding And Exploiting LFI Vulnerability
bypass403
Using this tool, you can fuzz your 403/401 endpoint and try to access it without any restrictions. You can also customize your payloads and update them regularly
cdnsift
Filter CDN IP addresses using automated and custom CIDR ranges.
EventLog-Ninja
This Powerful Yet Simple Script Will Disable Windows Event Log Without Any Obvious Indication
JiraVulChecker
Using this tool you can simply check common vulnerabilities on your target Jira server
mac-changer-gui
Python Script To Change Mac Address Using A Graphical User Interface
msfvenom-Payload-Maker
By Using This Tool, You Can Easily Create Your Payloads Using msfvenom By Couple Of Clicks
rezasarvani's Repositories
rezasarvani/bypass403
Using this tool, you can fuzz your 403/401 endpoint and try to access it without any restrictions. You can also customize your payloads and update them regularly
rezasarvani/msfvenom-Payload-Maker
By Using This Tool, You Can Easily Create Your Payloads Using msfvenom By Couple Of Clicks
rezasarvani/AbuseIP-Checker
Check Malicious Status Of An IP Address List Using AbuseIP Database
rezasarvani/BitSecurity-LFIFinder
Using This Powerfull Tool, You Can Automate Finding And Exploiting LFI Vulnerability
rezasarvani/cdnsift
Filter CDN IP addresses using automated and custom CIDR ranges.
rezasarvani/JiraVulChecker
Using this tool you can simply check common vulnerabilities on your target Jira server
rezasarvani/EventLog-Ninja
This Powerful Yet Simple Script Will Disable Windows Event Log Without Any Obvious Indication
rezasarvani/mac-changer-gui
Python Script To Change Mac Address Using A Graphical User Interface
rezasarvani/asdasdadasd
asdasdasd
rezasarvani/backupHunter
With backupHunter, you can create every possible permutation of possible backup names and brute force targets for backup files containing juicy information.
rezasarvani/CVE-2022-26809
CVE-2022-26809 PoC
rezasarvani/deepurlparser
A wrapper around 'tldextract' library in order to access different part of URL more easily.
rezasarvani/livstream-recon
rezasarvani/RedTeamAutomation
This repository will contain automation tools that each simulate a single Mitre Tactic-Technique
rezasarvani/rezasarvani
Config files for my GitHub profile.
rezasarvani/start-calc
Sample payload to start calc.exe using rundll32
rezasarvani/swagerxsstest
rezasarvani/sysmon-config
Sysmon configuration file template with default high-quality event tracing