Jai Gupta's repositories
CVE-2019-0232
Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)
100daysofcyber
Tracking my progress for 100 days learning something new daily....
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
SiteCrawler
This is my project which crawls the given website and gives useful information.
A-to-Z-Resources-for-Students
âś… Curated list of resources for college students
blog-1
a random blog about cybersecurity and programming
Code-Overflow
Awesome Coding Problems
CTF-Difficulty
This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
dagger
A Crypto-CTF Assistant For Saving You Time
dirsearch
Web path scanner
GTFOBins.github.io
Curated list of Unix binaries that can be exploited to bypass system security restrictions
hacker-roadmap
:pushpin: Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
jaiguptanick
https://github.com/jaiguptanick/jaiguptanick
lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
onepunchinstaller
Install mostly used pentesting and CTF tools in Ubuntu 18.04 without adding any extra repository, preventing any crashes in repositories.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
PhoneInfoga
Advanced information gathering & OSINT framework for phone numbers
Practical-Ethical-Hacking-Resources
Compilation of Resources from TCM's Udemy Course
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
seeker
Accurately Locate Smartphones using Social Engineering
torghost
TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.
Tutorials
My notes
webcrawler
hactoberfest