Muhamamd Adib Dzulfikar's starred repositories

blogpost_qiling_dlink_1

Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow affecting the emulated binary is provided.

Language:PythonLicense:MITStargazers:30Issues:0Issues:0

binwalk

Firmware Analysis Tool

Language:PythonLicense:MITStargazers:10483Issues:0Issues:0

OneForAll

OneForAll是一款功能强大的子域收集工具

Language:PythonLicense:GPL-3.0Stargazers:8075Issues:0Issues:0

hetty

An HTTP toolkit for security research.

Language:GoLicense:MITStargazers:6037Issues:0Issues:0

fzf

:cherry_blossom: A command-line fuzzy finder

Language:GoLicense:MITStargazers:63264Issues:0Issues:0

C-from-Scratch

A roadmap to learn C from Scratch

Language:CStargazers:396Issues:0Issues:0

SecurityExplained

SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.

Stargazers:523Issues:0Issues:0

pocketbase

Open Source realtime backend in 1 file

Language:GoLicense:MITStargazers:38146Issues:0Issues:0

gospider

Gospider - Fast web spider written in Go

Language:GoLicense:MITStargazers:2490Issues:0Issues:0

proxify

A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.

Language:GoLicense:MITStargazers:2668Issues:0Issues:0

NetExec

The Network Execution Tool

Language:PythonLicense:BSD-2-ClauseStargazers:2743Issues:0Issues:0

cook

A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.

Language:GoLicense:MITStargazers:991Issues:0Issues:0
Language:PythonStargazers:532Issues:0Issues:0

pipework

Software-Defined Networking tools for LXC (LinuX Containers)

Language:ShellLicense:Apache-2.0Stargazers:4210Issues:0Issues:0
Language:GoStargazers:214Issues:0Issues:0

exploit_training

The best resources for learning exploit development

Stargazers:96Issues:0Issues:0

red-team-playground

Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2, evasion, etc).

Language:HTMLLicense:MITStargazers:82Issues:0Issues:0
Language:C++License:NOASSERTIONStargazers:157Issues:0Issues:0
Language:JavaScriptStargazers:453Issues:0Issues:0

RedTeam-Tools

Tools and Techniques for Red Team / Penetration Testing

Stargazers:5717Issues:0Issues:0

Ropper

Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.

Language:PythonLicense:BSD-3-ClauseStargazers:1830Issues:0Issues:0

dynamorio

Dynamic Instrumentation Tool Platform

Language:CLicense:NOASSERTIONStargazers:2600Issues:0Issues:0

QBDI

A Dynamic Binary Instrumentation framework based on LLVM.

Language:C++License:NOASSERTIONStargazers:1373Issues:0Issues:0

ghauri

An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws

Language:PythonLicense:MITStargazers:2864Issues:0Issues:0

VX-API

Collection of various malicious functionality to aid in malware development

Language:C++License:MITStargazers:1405Issues:0Issues:0

Bug-bounty

Ressources for bug bounty hunting

Stargazers:1690Issues:0Issues:0

Python-Ethical-Hacking

Python Ethical Hacking, published by Packt

Language:PythonLicense:MITStargazers:124Issues:0Issues:0

Facebook-BugBounty-Writeups

Collection of Facebook Bug Bounty Writeups

Stargazers:581Issues:0Issues:0