Chege, CJN (cjnchege)

cjnchege

Geek Repo

Github PK Tool:Github PK Tool

Chege, CJN's repositories

Stargazers:0Issues:0Issues:0

the-book-of-secret-knowledge

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

License:MITStargazers:0Issues:0Issues:0

dronesploit

Drone pentesting framework console

License:AGPL-3.0Stargazers:0Issues:0Issues:0

duke-coursera-ccf-lab1

Example code for Lab1

License:CC0-1.0Stargazers:0Issues:0Issues:0

metasploit-framework

Metasploit Framework

License:NOASSERTIONStargazers:0Issues:0Issues:0

SecLists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

License:MITStargazers:0Issues:0Issues:0

DVWA

Damn Vulnerable Web Application (DVWA)

License:GPL-3.0Stargazers:0Issues:0Issues:0

john

John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs

Stargazers:0Issues:0Issues:0

PayloadsAllTheThings

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

License:MITStargazers:0Issues:0Issues:0

Windows-Exploit-Suggester

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.

License:GPL-3.0Stargazers:0Issues:0Issues:0

fullstack-course4

Example code for HTML, CSS, and Javascript for Web Developers Coursera Course

Stargazers:0Issues:0Issues:0

Ciphey

⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡

License:MITStargazers:0Issues:0Issues:0

hackingtool

ALL IN ONE Hacking Tool For Hackers

License:MITStargazers:0Issues:0Issues:0

Veil

Veil 3.1.X (Check version info in Veil at runtime)

License:GPL-3.0Stargazers:0Issues:0Issues:0

urh

Universal Radio Hacker: Investigate Wireless Protocols Like A Boss

License:GPL-3.0Stargazers:0Issues:0Issues:0

python-viptela

Cisco Viptela vManage Python CLI/SDK

License:GPL-3.0Stargazers:0Issues:0Issues:0

TheFatRat

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .

License:GPL-3.0Stargazers:0Issues:0Issues:0
License:Apache-2.0Stargazers:0Issues:0Issues:0

cisco-ftdv

FTDv auto scaling on Azure and AWS

License:Apache-2.0Stargazers:0Issues:0Issues:0

ansible-meraki

Cisco Meraki Ansible Collection

Stargazers:0Issues:0Issues:0

yangsuite

Cisco YANG Suite provides a set of tools and plugins to learn, test, and adopt YANG programmable interfaces such as NETCONF, RESTCONF, gNMI and more.

License:NOASSERTIONStargazers:0Issues:0Issues:0

cjnchege

Config files for my GitHub profile.

Stargazers:0Issues:0Issues:0

meraki-code

Code for All Meraki Labs

License:MITStargazers:0Issues:0Issues:0

HackTheBox-CTF-Writeups

This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficulty.

Stargazers:0Issues:0Issues:0

startnow-Intro-to-Python-buildpacks

This repo walks through the basics of using a python build pack to build your docker containers.

License:BSD-3-ClauseStargazers:0Issues:0Issues:0

stealthwatch-enterprise-sample-scripts

Collection of sample scripts for interacting with Cisco Stealthwatch Enterprise APIs.

License:BSD-3-ClauseStargazers:0Issues:0Issues:0

Resources-for-Beginner-Bug-Bounty-Hunters

A list of resources for those interested in getting started in bug bounties

Stargazers:0Issues:0Issues:0

PENTESTING-BIBLE

Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.

License:MITStargazers:0Issues:0Issues:0

linux-exploit-suggester-2

Next-Generation Linux Kernel Exploit Suggester

License:GPL-2.0Stargazers:0Issues:0Issues:0

Hacking-Security-Ebooks

Top 100 Hacking & Security E-Books (Free Download)

Stargazers:0Issues:0Issues:0