Budi Khoirudin's repositories
CVE-2021-33909
Exploit code for CVE-2021-33909,Just a dump of removed https://github.com/AmIAHuman/ repo
docker-routeros
Mikrotik RouterOS inside Docker container
Clean-Architect-in-Golang
Open source from: https://youtu.be/Yg_ae0UvCv4
kube-vip
Kubernetes Control Plane Virtual IP and Load-Balancer
macro_pack
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
graphql-mesh-docker
Dockerfile / docker-compose / Kubernetes manifest / Helm chart for GraphQL Mesh
hbctool
Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode)
gixy
Nginx configuration static analyzer
Arbitrium-RAT
Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any firewall exceptions or port forwarding rules
watermill
Building event-driven applications the easy way in Go.
client-side-prototype-pollution
Prototype Pollution and useful Script Gadgets
netflix-pin-hacker
Destroy that Netflix parental control PIN.
examples
Examples for "Kubernetes Patterns - Reusable Elements for Designing Cloud-Native Applications"
slipstream
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by the victim visiting a website
GTFONow
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
golang-design-patterns
Implementation of design patterns in Golang
indonesia-stocks-scraper
fundamentals stock data scraper from IDX, RTI and stockbit. After data downloaded you can convert it into another format like json for further analytics (prediction, classification, data visualization etc). PS: Just for educational porpose only.
helm-operator-get-started
Managing Helm releases with Flux Helm Operator
LeakLooker-X
LeakLooker GUI - Discover, browse and monitor database/source code leaks
helm-git-1
Helm plugin to fetch charts from Git repositories
Data-Security
Enterprise Data Loss Prevention - Profile, Classify, Protect Enterprise Data
keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
Kernel-Bridge
Windows kernel hacking framework, driver template, hypervisor and API written on C++
Modlishka
Modlishka. Reverse Proxy.
BruteShark
Network Analysis Tool
pe_to_shellcode
Converts PE into a shellcode
s3browser
Web-based S3 bucket browsing tool. Similar to Apache-style indexes.