sujayadkesar
Digital Forensics Analyst cybersecurity and cyberforensics https://thelocalh0st.github.io
#!/Unsupervised/Learning127.0.0.1
Pinned Repositories
auto-rec0n
Auto Recon is a Bash script for automating the reconnaissance phase of penetration testing. It performs various types of scans to gather information about the target domain, including IP details, domain reconnaissance, vulnerability scanning, network mapping, application fingerprinting, and Google dorks.
cybersecurity-resources
Cybersecurity Resources
Let-s-Exploit
#Cybersec community
LinkHive
Gather all the links inside the webpage for a given target domain name
Linux-Privilege-Escalation
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
reverse-shell-generator
A python based tool which dynamically generate the reverse-shell payload based on the user requirements🛡️💻
searchbar
A Programmable search engine. In which search results are only focused on Cybersecurity resources
sujayadkesar
A formal cybersecurity student 💻🛡️
terminal_portfolio
portfolio in terminal style created by only html css and javascript with diffrent themes aswell as shortcuts and autocomplete commands features.
web-dork
In the context of web application penetration testing, Google Dorks can be used to find vulnerabilities and sensitive information in websites. This involves searching for specific keywords or file types that can indicate the presence of vulnerabilities or sensitive information, such as login pages, database files, and backups.
sujayadkesar's Repositories
sujayadkesar/cybersecurity-resources
Cybersecurity Resources
sujayadkesar/auto-rec0n
Auto Recon is a Bash script for automating the reconnaissance phase of penetration testing. It performs various types of scans to gather information about the target domain, including IP details, domain reconnaissance, vulnerability scanning, network mapping, application fingerprinting, and Google dorks.
sujayadkesar/reverse-shell-generator
A python based tool which dynamically generate the reverse-shell payload based on the user requirements🛡️💻
sujayadkesar/sujayadkesar
A formal cybersecurity student 💻🛡️
sujayadkesar/Let-s-Exploit
#Cybersec community
sujayadkesar/pentesting-toolkit-on-docker
A multi-platform penetration testing toolkit that can be set-up with Docker 🐋
sujayadkesar/portfolio
A portfolio website designed to display some of my skills✨🌈
sujayadkesar/ArtifactParsers
A repo that aims to centralize a current, running list of relevant parsers/tools for known DFIR artifacts
sujayadkesar/chatroom
Python based community chatroom !
sujayadkesar/control-ac-appliances
sujayadkesar/dos-portfolio
sujayadkesar/govardhana
Work in progress ⚠️ 🚧
sujayadkesar/IBM-Hyperledger-fabric
Exploring the permissioned Block chain network # IBM Hyperledger fabric
sujayadkesar/SPF-Checker
Gathers the spf record of the given target domain using bash scripting ⚡
sujayadkesar/web-dork
In the context of web application penetration testing, Google Dorks can be used to find vulnerabilities and sensitive information in websites. This involves searching for specific keywords or file types that can indicate the presence of vulnerabilities or sensitive information, such as login pages, database files, and backups.
sujayadkesar/Wifi-Deauther
A wifi-deauther using Nodemcu-ESP8266
sujayadkesar/YelpCamp
sujayadkesar/thelocalh0st.github.io
A walkthrough site made with jekyll in which you can see the writeups for HackTheBox and Tryhackme challenges , CTF's , machines and many more!
sujayadkesar/awesome-forensics
A curated list of awesome forensic analysis tools and resources
sujayadkesar/Bug-Bounty-POC-Templates
UNDER DEVELOPMENT
sujayadkesar/bytras
sujayadkesar/c
sujayadkesar/ctfd
sujayadkesar/Doc
sujayadkesar/FloodHault
sujayadkesar/ForensicVault
sujayadkesar/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
sujayadkesar/temp
Work in progress ⚠️ 🚧
sujayadkesar/UFADE
Extract files from iOS devices on Linux and MacOS. Mostly a wrapper for pymobiledevice3. Creates iTunes-style backups and "advanced logical backups"
sujayadkesar/windows-forensic-artifacts
Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!