Areed Ahmed A's repositories

Java-Deserializer

This tool is responsible to perform java deserialization attacks on server end points

Language:PythonStargazers:1Issues:0Issues:0

api-backend

REST API backend for Reconmap

Language:PHPLicense:GPL-3.0Stargazers:0Issues:0Issues:0

api_paths

A list of REST API URL paths for use in blackbox API end-point discovery

Language:RubyStargazers:0Issues:0Issues:0

awesome-cve-poc

✍️ A curated list of CVE PoCs.

Stargazers:0Issues:0Issues:0

bruteforce-lists

Some files for bruteforcing certain things.

License:Apache-2.0Stargazers:0Issues:0Issues:0

endgame

An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet 😈

License:MITStargazers:0Issues:0Issues:0

firebase

Exploiting misconfigured firebase databases

License:MITStargazers:0Issues:0Issues:0

gau

Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.

License:MITStargazers:0Issues:0Issues:0

git-dumper

A tool to dump a git repository from a website

License:MITStargazers:0Issues:0Issues:0

GitDorker

A Python program to scrape secrets from GitHub through usage of a large repository of dorks.

Stargazers:0Issues:0Issues:0

gitleaks

Audit git repos for secrets 🔑

Language:GoLicense:GPL-3.0Stargazers:0Issues:0Issues:0

hackerone-reports

Top disclosed reports from HackerOne

Stargazers:0Issues:0Issues:0

InformationSecurity

A place where I can create, collect and share tooling, resources and knowledge about information security.

Language:PythonStargazers:0Issues:0Issues:0

keyhacks

Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.

Stargazers:0Issues:0Issues:0

livestream-api-samples

Public API Sample

License:MITStargazers:0Issues:0Issues:0

Malware-Exhibit

🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have created or Compiled/analysed🔥 to understand more about Malware threats😈, analysis and mitigation🧐.

License:MITStargazers:0Issues:0Issues:0

MalwareSourceCode

Collection of malware source code for a variety of platforms in an array of different programming languages.

Stargazers:0Issues:0Issues:0

Resources-for-Beginner-Bug-Bounty-Hunters

A list of resources for those interested in getting started in bug bounties

Stargazers:0Issues:0Issues:0
Stargazers:0Issues:1Issues:0

SecLists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

License:MITStargazers:0Issues:0Issues:0

Secured-Chat-System

This project was built to make a secure chat system using security protocols.

Language:JavaScriptStargazers:0Issues:0Issues:0

smuggler

Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

svg-cheatsheet

A cheatsheet for exploiting server-side SVG processors.

Stargazers:0Issues:0Issues:0

takeover

Sub-Domain TakeOver Vulnerability Scanner

License:MITStargazers:0Issues:0Issues:0

The-Box-purchase-app-

A freelancing project -> Inventory app

Language:HTMLStargazers:0Issues:0Issues:0

User-Agent-Bruter

Brute force a web target with different user-agents to see response from web server.

Stargazers:0Issues:0Issues:0

wordlist

Collection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passwords.

Stargazers:0Issues:0Issues:0

Wordlist404

Small but effective wordlist for brute-forcing and discovering hidden things.

Stargazers:0Issues:0Issues:0

xsshunter

The XSS Hunter service - a portable version of XSSHunter.com

License:MITStargazers:0Issues:0Issues:0

XSStrike

Most advanced XSS scanner.

License:GPL-3.0Stargazers:0Issues:0Issues:0