Isaac Newton's repositories
Capture-The-Flag---THM
A spectrogram is a visual representation of the spectrum of frequencies of a signal as it varies with time. When applied to an audio signal, spectrograms are sometimes called sonographs, voiceprints, or voicegrams. When the data is represented in a 3D plot they may be called waterfalls.
CMS-Exploit
An exploit for CMS in order to perform Remote Code Execution (RCE) through the design manager flaw in the system
Image-Compression
Performing image compression using the singular value decomposition algorithm specifically implementing an economy SVD to compress the image. It also has a plot of singular values and the cumulative singular values on the energy used at different r nodes to compress the image
Unitary-Transformations
Transformation made using the SVD algorithm for decomposition when U and V transpose are unitary and sigma is the diagonal matrix
AORT
All in One Recon Tool for Bug Bounty
capture_sec
This is an automation tool that can help you to solve for capture
cascade-server
CASCADE Server
CVE-2023-25690-POC
CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.
dashboard-scd
Dashboard-SCD
fake-sms
A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy.
js-e2e-express-server
Replacement used in documentation for express generator.
Microsoft-Activation-Scripts
A Windows and Office activator using HWID / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
Mosquitto-Authentication-ByPass
A script to authenticate to a MQTT service other than mosquitto_sub -t 'test/topic' -v
OSINT-SPY
Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cyber crime investigator in order to find deep information about their target. If you want to ask something please feel free to reach out to me at robotcoder@protonmail.com
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
pipelines-java
Sample Java application referred to by Azure Pipelines documentation
React-Trippy-Tour-Website-Template
This is our second intermediate project for react js beginners. Tippy is a tour and travel multipage responsive website design.
RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
SCD-Final
Material Kit React free and open source by Creative Tim
Scripting-for-Pentesters
A collection of quick effective tools to automate tasks such as hash cracking, key logging, enumeration and scanning.
Stone-Mason
Introductory language to programming
wsuxploit
This is a weaponized WSUS exploit