Pinned Repositories
30-Days-Of-Python
30 days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than100 days, follow your own pace. These videos may help too: https://www.youtube.com/channel/UC7PNRuno1rzYPb1xLa4yktw
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
awesome
:sunglasses: Curated list of awesome lists
awesome-cve-poc
✍️ A curated list of CVE PoCs.
big-list-of-naughty-strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
nuclei-templates
Community curated list of templates for the nuclei engine to find security vulnerabilities.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
SecureCodingDojo
The Secure Coding Dojo is a platform for delivering secure coding knowledge.
xml_attacks
Collection of XML Attacks & Payloads
toekhaing's Repositories
toekhaing/xml_attacks
Collection of XML Attacks & Payloads
toekhaing/30-Days-Of-Python
30 days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than100 days, follow your own pace. These videos may help too: https://www.youtube.com/channel/UC7PNRuno1rzYPb1xLa4yktw
toekhaing/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
toekhaing/awesome
:sunglasses: Curated list of awesome lists
toekhaing/awesome-cve-poc
✍️ A curated list of CVE PoCs.
toekhaing/big-list-of-naughty-strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
toekhaing/bug-bounty-reference
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
toekhaing/bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
toekhaing/exploit-database
The official Exploit Database repository
toekhaing/fuzzdb
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
toekhaing/nuclei-templates
Community curated list of templates for the nuclei engine to find security vulnerabilities.
toekhaing/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
toekhaing/SecureCodingDojo
The Secure Coding Dojo is a platform for delivering secure coding knowledge.
toekhaing/github-dorks
The repository contains useful GitHub dorks for finding open-source vulnerabilities.
toekhaing/graduation
$ git remote <graduation> yearbook
toekhaing/HowToHunt
Collection of methodology and test case for various web vulnerabilities.
toekhaing/linux-kernel-exploits
linux-kernel-exploits Linux平台提权漏洞集合
toekhaing/oxml_xxe
A tool for embedding XXE/XML exploits into different filetypes
toekhaing/samsung-ime-rce-poc
Samsung Remote Code Execution as System User
toekhaing/script
My Impotant scripts and command while performing assessment.
toekhaing/The-Shell
Ghost Theme
toekhaing/threat-hunting-kiddie
Threat Hunting Kiddie compile the techniques and Indicator of Compromise (IoC) to perform the Compromise Assessment and Threat Hunting.
toekhaing/ThreatHunting
An informational repo about hunting for adversaries in your IT environment.
toekhaing/top-10-cicd-security-risks
toekhaing/udpstorm
UDP attack also called Chargen Attack.
toekhaing/vane
A GPL fork of the popular wordpress vulnerability scanner WPScan
toekhaing/VulnPlanet
Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)
toekhaing/weapons4pentester
:hocho: This repo contains required files for web application pentest.
toekhaing/XSSYA
XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)
toekhaing/your-first-lab-cb-gh-000