NCHAUPE SOLOMON SETSHEDI's repositories
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
bingo
BINGO Android Game
BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
Covid-19estimater-Andela
Andela Assessment Python Challenge
google-dorks-bug-bounty
A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting
Hackfu-Dojo
Collection of Books, Labs, Remediation plans for the labs and security improvements
hashclash
Project HashClash - MD5 & SHA-1 cryptanalysis
keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
misp-docker
MISP Docker (XME edition)
OSCE-Complete-Guide
OSWE, OSEP, OSED
phoneinfoga
Information gathering framework for phone numbers
RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
Social-Coding-
Mobile IDE for Social Coding kids http://www.socialcodingsa.com/
workshop-2021-learning-journey
Introduction and Workshop to GitHub Advance Security for Learning Journey (May 2021)