M. Taufik Nelas's repositories
ctf-tools
Some setup scripts for security research tools.
Books
Collection of Programming, Databases, Linux & Tools Books
docker-php-nginx
Docker image with Nginx 1.16 & PHP-FPM 7.3 on Alpine Linux
go-redis-kubernetes
Deploying a Go web app with Redis on Kubernetes
the-book-of-secret-knowledge
:zap: A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
kubernetes-rbac-policies
Kubernetes RBAC Policies for cluster services
Learning-Python-for-Forensics-Second-Edition
Learning Python for Forensics, Second Edition, Published by Packt
CobaltStrike-ToolKit
Some useful scripts for CobaltStrike
slack-error-notifier
Send a message to a Slack channel when an error occurs in your Laravel Application (Laravel 5.5)
backdoor-apk
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
burpa
Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Application Security Testing (DAST).
devsecops-example-helloworld
Example of a CI/CD Pipeline using Jenkins Multi-branch Pipelines hosted at AWS
PHP-backdoors
A collection of PHP backdoors. For educational or testing purposes only.
B2E
Bat To Exe Converter can convert BAT (.bat) script files to the EXE (.exe) format.
TIG-on-Kubernetes
Telegraf, InfluxDB, and grafana on Kubernetes
cloacked-pixel
LSB steganography and detection
nfi
Silensec's Nyuki Forensics Investigator (Mobile Forensics)
mobile-forensic-articles
Mobile Forensic Academic Articles
Data-Exfiltration
secret_sender is a program that manipulates the IP packet to send a message accepted from command line through one of the protocols (TCMP Echo Request, TCP SYN or UDP) to exfiltrate data onto a server. Since it looks like a normal packet to the server, it does not suspect anything.
XSS-Payloads
List of advanced XSS payloads
php-webshells
Common php webshells. Do not host the file(s) on your server!
cscu-library
CSCU Library and Exam Bank
gh0st
a open source remote administrator tool