Ahsan Ziaullah's repositories
can-it-be-done-in-react-native
⚛️ 📺 Projects from the “Can it be done in React Native?” YouTube series
CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
dirbuster-ng
dirbuster-ng is C CLI implementation of the Java dirbuster tool
explain-BERT-QA
Code for the CIKM 2019 Paper: How Does BERT Answer Questions? A Layer-Wise Analysis of Transformer Representations
kube-bench
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
kubernetes-goat
Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
kubestriker
A Blazing fast Security Auditing tool for Kubernetes
linux-smart-enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
nginx-modsecurity-crs
Docker Compose project to setup a ModSecurity enabled Nginx container with the CRS.
nmapAutomator
A script that you can run in the background!
OSCP-Exam-Report-Template
Modified template for the OSCP Exam and Labs. Used during my passing attempt
OSCP-Human-Guide
My own OSCP guide
OSCP-PWK-Notes-Public
:closed_book: Optixal's Offensive Security Certified Professional (OSCP) / Penetration Testing with Kali Linux (PWK) Personal Notes :computer:
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
react-native-apple-music
A react native module for the Apple Music SDK. Works only with iOS.
react-native-elements
Cross Platform React Native UI Toolkit
react-native-example
React Native Activity Feed example application
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Security-Research
Exploits written by the Rhino Security Labs team
Sublist3r
Fast subdomains enumeration tool for penetration testers
testdelete
testdelete
what_is_this_c2
For all these times you're asking yourself "what is this panel again?"