Anish Poudel's repositories
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
GOAD
game of active directory
AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
FinalRecon
The Last Web Recon Tool You'll Need
awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
AWS-Threat-Simulation-and-Detection
Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic
list-infosec-encyclopedia
A list of information security related awesome lists and other resources.
AORT
All in One Recon Tool for Bug Bounty
EvilnoVNC
Ready to go Phishing Platform
Zphisher-GUI-Back_office
A Zphisher GUI Back-Office Plugin
FBI-tools
🕵️ OSINT Tools for gathering information and actions forensics 🕵️
turbo-attack
A turbo traffic generator pentesting tool to generate random traffic with random mac and ip addresses in addition to random sequence numbers to a particular ip and port.
rconn
rconn is a multiplatform program for creating generic reverse connections. Lets you consume services that are behind firewall or NAT without opening ports or port-forwarding.
malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
Smap
a drop-in replacement for Nmap powered by shodan.io
ThePhish
ThePhish: an automated phishing email analysis tool
Awesome-RedTeam-Cheatsheet
Active Directory & Red-Team Cheat-Sheet in constant expansion.
Bash-Oneliner
A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.
OSCP-Cheatsheat
This is a cheatsheat for everything OSCP.
SandboxDefender
C# code to Sandbox Defender (and most probably other AV/EDRs).
pentest-guide
Penetration tests guide based on OWASP including test cases, resources and examples.
O365-Doppelganger
A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user
ICMP-TransferTools
Transfer files to and from a Windows host via ICMP in restricted network environments.
bug-bounty-reference
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
SauronEye
Search tool to find specific files containing specific words, i.e. files containing passwords..