Santhosh Baswa's repositories
Threat_Intelligence
Threat-Intelligence Feeds & Tools & Frameworks
Social-Media-OSINT
Social Media OSINT collection containing - tools, techniques & tradecraft.
API-SecurityEmpire
API Security Project aims to present unique attack & defense methods in API Security field
Awesome-SOAR
A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.
CVE-2022-36446-Webmin-Software-Package-Updates-RCE
A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.
devops-exercises
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
greenbone-gvm-openvas-for-docker
The Greenbone Vulnerability Management (GVM) and OpenVAS Scanner for Docker!
htb_writeups
Writeups for vulnerable machines.
Microsoft-eventlog-mindmap
Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...
OffensiveNotion
Notion as a platform for offensive operations
OSQUERY-PACKS
Osquery Packs we use for customer security hardening
PhishingKitTracker
Let's track phishing kits to give to research community raw material to study !
requests-ip-rotator
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
SQLiDetector
Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.
TeamFiltration
TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts
detection-and-response-pipeline
✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The purpose is to create a reference hub for designing effective threat detection and response pipelines. 👷 🏗