sbinsaleem
I provide training on techniques and tools in the field of cyber security. Earlier, I have conducted research on vulnerability assessment and patch management.
Consultancy, Training and Open for New OpportunitiesLahore, Pakistan
Pinned Repositories
AEVA-Blackbox-Backdoor-Detection-main
ansible-labs
Labs for Ansible used in Dice DevOps course
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
Antimalware-Research
Research on Anti-malware and other related security solutions
antispy
AntiSpy is a free but powerful anti virus and rootkits toolkit.It offers you the ability with the highest privileges that can detect,analyze and restore various kernel modifications and hooks.With its assistance,you can easily spot and neutralize malwares hidden from normal detectors.
api-firewall
Fast and light-weight API proxy firewall for request and response validation by OpenAPI specs.
api-guidelines
Microsoft REST API Guidelines
awesome-azure-learning
This repo includes plenty of references for Azure learning, especially for the Azure certs and Azure architecture, and any other learning materials e.g. security and automation topics.
awesome-compose
Awesome Docker Compose samples
sbinsaleem
Config files for my GitHub profile.
sbinsaleem's Repositories
sbinsaleem/sbinsaleem
Config files for my GitHub profile.
sbinsaleem/ansible-labs
Labs for Ansible used in Dice DevOps course
sbinsaleem/Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
sbinsaleem/api-firewall
Fast and light-weight API proxy firewall for request and response validation by OpenAPI specs.
sbinsaleem/awesome-docker
:whale: A curated list of Docker resources and projects
sbinsaleem/Backend
sbinsaleem/CertificationMaterials
A collection of materials related to my certification videos
sbinsaleem/community
Repository of modules and signatures contributed by the community
sbinsaleem/DevSecOps-MaturityModel
sbinsaleem/DevSecOps-Playbook
This is a step-by-step guide to implementing a DevSecOps program for any size organization
sbinsaleem/docker-wallarm-node
⚡️ Docker official image for Wallarm Node. API security platform agent.
sbinsaleem/DVWA
Damn Vulnerable Web Application (DVWA)
sbinsaleem/Frontend
sbinsaleem/Gmail-Brute
A tool to brute force a gmail account. Use this tool to crack multiple accounts. This tool is developed to crack multiple accounts
sbinsaleem/gmetrics
The GMetrics project provides calculation and reporting of size and complexity metrics for Groovy source code. GMetrics scans Groovy source code, applying a set of metrics, and generates an HTML report of the results.
sbinsaleem/hackingtool
ALL IN ONE Hacking Tool For Hackers
sbinsaleem/HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Windows Driver
sbinsaleem/helm-charts
Wallarm public charts repository
sbinsaleem/kubernetes-goat
Kubernetes Goat 🐐 is a "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security 🔐
sbinsaleem/MITRE-ATT-CK-Mappings
This project empowers defenders with independent data on which native security controls of leading technology platforms are most useful in defending against the adversary TTPs they care about.
sbinsaleem/My-Certificates
sbinsaleem/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
sbinsaleem/pentesting-practice
sbinsaleem/personal-website
This is just an old personal website for testing purpose.
sbinsaleem/phpMussel
PHP-based anti-virus anti-trojan anti-malware solution.
sbinsaleem/practice
sbinsaleem/Smap
a drop-in replacement for Nmap powered by shodan.io
sbinsaleem/social-engineer-toolkit
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
sbinsaleem/sqlmap
Automatic SQL injection and database takeover tool
sbinsaleem/trivy
Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues