Pinned Repositories
alternate-install
alternate installation script for debian
artificial-intelligence
collections
chrome-app-samples
Chrome Apps
data
Mixed DATA
fluxion
ipcamshell
IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiting Surveillance Cameras Like a Hollywood Hacker". See the slides here: https://media.blackhat.com/us-13/US-13-Heffner-Exploiting-Network-Surveillance-Cameras-Like-A-Hollywood-Hacker-WP.pdf
ldap
ldap ddos tool
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
vmwarescanner
VMware server scann and exploit
serhatgksu's Repositories
serhatgksu/ldap
ldap ddos tool
serhatgksu/artificial-intelligence
collections
serhatgksu/ipcamshell
IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiting Surveillance Cameras Like a Hollywood Hacker". See the slides here: https://media.blackhat.com/us-13/US-13-Heffner-Exploiting-Network-Surveillance-Cameras-Like-A-Hollywood-Hacker-WP.pdf
serhatgksu/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
serhatgksu/vmwarescanner
VMware server scann and exploit
serhatgksu/alternate-install
alternate installation script for debian
serhatgksu/chrome-app-samples
Chrome Apps
serhatgksu/data
Mixed DATA
serhatgksu/fluxion
serhatgksu/frequently-used-cmds
handy
serhatgksu/gizlen
Debian server anonymity service.
serhatgksu/LogonTracer
Investigate malicious Windows logon by visualizing and analyzing Windows event log
serhatgksu/MS08-067-Exploit-Tool
MS08-067 Vulnerabilities scann and exploit tool.
serhatgksu/python-kod-bankasi
python kod bankasi
serhatgksu/Recipe
Collection of PHP Functions
serhatgksu/rtpflood
rtpflood : Tool to flood any RTP device
serhatgksu/ScriptHelper
Shell libraries to help writting shell script
serhatgksu/SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
serhatgksu/struts-pwn_CVE-2018-11776
An exploit for Apache Struts CVE-2018-11776
serhatgksu/webshell
This is a webshell open source project
serhatgksu/wifiphisher
The Rogue Access Point Framework