Shirshak Roy's repositories
Osint-tool
An osint-based Information Gathering and Recon tool made in Bash for Automation by using multiple tools.
999-Computer-Books
"Programmers are not to be measured by their ingenuity and their logic but by the completeness of their case analysis." β Alan J. Perlis
Computer-Science-Study-Material
"The universe doesn't allow perfection." β Stephen Hawking
interactive-tutorials
Interactive Tutorials
400-Plus-Software-Security-Papers
"Computation is not the same as thought and emulation is not the same as imagination."β Abhijit Naskar
Cheatsheet-God
Penetration Testing / OSCP Biggest Reference Bank
Cyber-Security-Books
"To competently perform rectifying security service, two critical incident response elements are necessary: information and organization." β Robert E. Davis
email2phonenumber
A OSINT tool to obtain a target's phone number just by having his email address
hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Linux-kernel-security-papers
"We cannot rest and sit down lest we rust and decay. Health is maintained only through work. And as it is with all life so it is with science. We are always struggling from the relative to the absolute."β Max Planck
List-of-security-hacking-incidents
"If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked" β Richard Clarke
myfirstwebsite
My first website(Second try)
nmap
Nmap - the Network Mapper. Github mirror of official SVN repository.
oscp-pre-preparation-plan-and-notes
My OSCP Pre-Preparation Phase. I'm not sure if I'll be able to afford the exam but what count's trying and learning things. I'm gonna give it a try. [Start Date: 21st March 2022]
python-for-cybersecurity
This repository holds the Python scripts discussed in the Infosec Institute's Python for Cybersecurity learning Path
ransombile
Ransombile is a tool that can be used in different scenarios to compromise someoneβs digital life when having physical access to a locked mobile device
voicemailautomator
A tool that serves as a Proof of Concept for the research I presented at DEF CON 26, "Compromising online accounts by cracking voicemail systems"