Abartan Dhakal's repositories
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
Aus-Infosec-and-Pentesting-Companies
A list of information security companies that offer penetration testing services and/or other offensive red side orientated services at any level in Australia and New Zealand.
awesome-api-security
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
cloudfox
Automating situational awareness for cloud penetration tests.
devise
Flexible authentication solution for Rails with Warden.
Evilginx2-Phishlets
Evilginx2 Phishlets version (0.2.3) Only For Testing/Learning Purposes
evilgophish
evilginx2 + gophish
GraphCrawler
GraphQL automated security testing toolkit
invoke-atomicredteam
Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Red Team project.
Killer
Is a tool created to evade AVs and EDRs or security tools.
movies
I've captured the responses from a recent slack discussion of movies, tv shows and events that inspired peeps to move into infosec.
nuclei-wordfence-cve
You just found a hidden gem 💎 This repo contains a massive amount (8000+) of WordPress related Nuclei templates. Updated daily!
Phishious
An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
pocsuite3
pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.
Practice-AD-CS-Domain-Escalation
Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the white paper Certified Pre-Owned.
reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
reFlutter
Flutter Reverse Engineering Framework
scorebot
Scoring Engine for CTF competitions
Sigma-Rules
Rules generated from our investigations.
stunner
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
tpotce
🍯 T-Pot - The All In One Honeypot Platform 🐝
vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
waymore
Find way more from the Wayback Machine!