Incredible's repositories
SSRF_Vulnerable_Lab
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
sqlite-lab
This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is for fun. Just enjoy it \m/
Windows-AD-environment-related
This Repository contains the stuff related to windows Active directory environment exploitation
exploit-code-by-me
Exploit code developed/reproduced by me
ysoserial.net-complied
This repository contains complied exe of ysoserial.net ( ys.exe in directory ysoserial/bin/Debug). This work belongs to @pwntester bhai ji \m/
Red_Team_Op
Notes for the CRTO exam
OneListForAll
Rockyou for web fuzzing
API-Security-Checklist
Checklist of the most important security countermeasures when designing, testing, and releasing your API
atexec-pro
Fileless atexec, no more need for port 445
bfac
BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source code.
BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
C2-Tool-Collection
A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
DavRelayUp
DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the default settings).
mysql-fake-server
MySQL Fake Server (ysoserial gadget built in and written in java)
Network-segmentation-cheat-sheet
Best practices for segmentation of the corporate network of any company
psexec_noinstall
Repository contains psexec, which will help to exploit the forgotten pipe
RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
S4UTomato
Escalate Service Account To LocalSystem via Kerberos
Software-Security-Learning
Software-Security-Learning
VulnerableSAMLApp
Vulnerable SAML infrastructure training applicaiton
writeups
CTF writeups and the like