Chaitanya Krishna's repositories
0xsp-Mongoose
Privilege Escalation Enumeration Toolkit (ELF 64/32 ) , fast , intelligent enumeration with Web API integration . Mastering Your Own Finding
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
AndrewSpecial
AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.
attck4fraud
Principles of MITRE ATT&CK in the fraud domain
awesome
:sunglasses: Curated list of awesome lists
Awesome-Asset-Discovery
List of Awesome Asset Discovery Resources
Awesome-Networking
A curated list of awesome networking libraries, resources and shiny things
awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
awesome-threat-detection
A curated list of awesome threat detection and hunting resources
beebug
A tool for checking exploitability
Cheatsheet-God
Penetration Testing / OSCP Biggest Reference Bank / Cheatsheet
commix
Automated All-in-One OS command injection and exploitation tool.
DS_ML_Tutorial_NoteBooks_Jupyter
Data science and Machine Learning Jupyter Notebooks what i Practiced!!
hershell
Multiplatform reverse shell generator
keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
MISP
Access MISP via Web
Modlishka
Modlishka. Reverse Proxy. Phishing NG.
onionscan
OnionScan is a free and open source tool for investigating the Dark Web.
os-tutorial
How to create an OS from scratch
poc
Proof of Concepts
Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
Revoke-Obfuscation
PowerShell Obfuscation Detection Framework
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
SIEM
SIEM Tactics, Techiques, and Procedures
SPFAbuse
SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp
SpookFlare
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
stretcher
Tool designed to help identify open Elasticsearch servers that are exposing sensitive information
sysmon-modular
A repository of sysmon configuration modules
the-book-of-secret-knowledge
A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.