Pinned Repositories
AES_Decryptor
This tool help you to decryption of AES Encrypted file in very easy way.
bin2shell
bin2shell is very small utils for extract shell code from the binary file
CVE
Explain Some CVE, Which i Discovered
FIBox
FIBox is vulnerable web application only for File Inclusion Attack.
metasploit-dev
my private metasploit module
Shell-Finder
ShellFinder is a script to find proper shell for you.
shellcode
VoIP-Pentest-Cheatsheet
The VoIP Pentest cheat sheet was created to provide concise collection of high level value information on specific VoIP penetration testing topics.
Wireless-Pentest-Cheatsheet
The Wireless Pentest cheat sheet was created to provide concise collection of high value information on specific wireless penetration testing topics. this will include Bluetooth, WiFi etc wireless technologies.
touhidshaikh's Repositories
touhidshaikh/shellcode
touhidshaikh/AES_Decryptor
This tool help you to decryption of AES Encrypted file in very easy way.
touhidshaikh/Wireless-Pentest-Cheatsheet
The Wireless Pentest cheat sheet was created to provide concise collection of high value information on specific wireless penetration testing topics. this will include Bluetooth, WiFi etc wireless technologies.
touhidshaikh/VoIP-Pentest-Cheatsheet
The VoIP Pentest cheat sheet was created to provide concise collection of high level value information on specific VoIP penetration testing topics.
touhidshaikh/can-i-take-over-xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
touhidshaikh/FIBox
FIBox is vulnerable web application only for File Inclusion Attack.
touhidshaikh/MBE
Course materials for Modern Binary Exploitation by RPISEC
touhidshaikh/awesome-seo-tools-techniques
touhidshaikh/Burp-Suite-Certified-Practitioner-Exam-Study
Burp Suite Certified Practitioner Exam Study
touhidshaikh/CTFs
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
touhidshaikh/CVE-2024-4367-PoC
CVE-2024-4367 & CVE-2024-34342 Proof of Concept
touhidshaikh/dharma
Generation-based, context-free grammar fuzzer.
touhidshaikh/exploit-exercises
please visit:
touhidshaikh/holehe
holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
touhidshaikh/impresscms-docker
touhidshaikh/live-resume
Stand out of the crowd by showing a professional website/resume. Building fast and easy the best Personal Web Application resume!
touhidshaikh/metasploit-framework
Metasploit Framework
touhidshaikh/metasploitable4
Metasploitable4(Unofficially) is a VM that is built from the ground up with a large amount of security vulnerabilities.
touhidshaikh/pentest-reports
Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
touhidshaikh/PhpMetrics
Beautiful and understandable static analysis tool for PHP
touhidshaikh/portswigger-guide
touhidshaikh/rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
touhidshaikh/SCA_Audit
Software Composition Analyse
touhidshaikh/ShellPop
Pop shells like a master with this Reverse/Bind shell generator.
touhidshaikh/subzy
Subdomain takeover vulnerability checker
touhidshaikh/synackAPI
touhidshaikh/touhidshaikh
touhidshaikh/uptime
touhidshaikh/vue-gamepad
🎮 A Vue.js plugin to add gamepad support. Bind any element to trigger a callback when a gamepad button is pressed.
touhidshaikh/xless
The Serverless Blind XSS App