Pinned Repositories
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
api
Vulners Python API wrapper
aquatone
A Tool for Domain Flyovers
awesome-burp-extensions
A curated list of amazingly awesome Burp Extensions
bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
burp-vulners-scanner
Vulnerability scanner based on vulners.com search API
cheatsheets-ai
Essential Cheat Sheets for deep learning and machine learning researchers
ctf
ProCurve
script to control the configurations of identity on HP ProCurve
shrv's Repositories
shrv/ProCurve
script to control the configurations of identity on HP ProCurve
shrv/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
shrv/api
Vulners Python API wrapper
shrv/aquatone
A Tool for Domain Flyovers
shrv/awesome-burp-extensions
A curated list of amazingly awesome Burp Extensions
shrv/bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
shrv/burp-vulners-scanner
Vulnerability scanner based on vulners.com search API
shrv/cheatsheets-ai
Essential Cheat Sheets for deep learning and machine learning researchers
shrv/ctf
shrv/CTF_WRITEUPS
CTF Writeups
shrv/CVE-2019-0708
A Win7 RDP exploit
shrv/CVE-2019-0841
PoC code for CVE-2019-0841 Privilege Escalation vulnerability
shrv/dvcs-ripper
Rip web accessible (distributed) version control systems: SVN/GIT/HG...
shrv/EaST
Exploits and Security Tools Framework 2.0.0
shrv/fuzzbunch
NSA finest tool
shrv/getsploit
Command line utility for searching and downloading exploits
shrv/gixy
Nginx configuration static analyzer
shrv/impacket
Impacket is a collection of Python classes for working with network protocols.
shrv/LinkFinder
A python script that finds endpoints in JavaScript files
shrv/operation-red
A simple python scanner designed to find open redirect vulnerabilities.
shrv/OSINT-SAN
OSINT-SAN Framework дает возможность быстро находить информацию и деанонимизировать пользователей сети интернет. Программное обеспечение представляет собой framework, в котором содержатся 30 функций для поиска информации либо деанонимизации пользователей. С помощью моего ПО вы можете собирать информацию о пользователях в сети интернет, анонимно и без особых навыков.
shrv/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
shrv/PoC
Various PoCs
shrv/powershell
shrv/public-pentesting-reports
Curated list of public penetration test reports released by several consulting firms and academic security groups
shrv/security-onion
Linux distro for IDS, NSM, and Log Management
shrv/seq2seq-web-attack-detection
The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The main goal of this project is to demonstrate the relevance of the NLP approach for web security.
shrv/shadowbroker
The Shadow Brokers "Lost In Translation" leak
shrv/tplmap
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
shrv/truegaze
Static analysis tool for Android/iOS apps focusing on security issues outside the source code