Hackwithvyshu 's repositories
kochi-workshop-23
notes for Kochi workshop 23
Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
CEH-Exam-Questions
Planning To Take Certified Ethical Hacker (CEH)? Here are github repo with 125 questions and answers to help you prep for the test
spiderfoot
SpiderFoot automates OSINT collection so that you can focus on analysis.
apache-superset
Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset
cowrie
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
cupp
Common User Passwords Profiler (CUPP)
domain-checker
Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydrattack.com), the main idea of which is, based only on the domain name, find almost all of the subdomains and their top 100 open ports
eschalot
Generate a Custom Onion Address with works using wordlists.
evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Fast-Google-Dorks-Scan
The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widespread file types and path traversal. The 100% automated.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
PowerJoker
A random powershell Reverse-Shell in each execution taking LHOST/LPORT
Qu1cksc0pe
All-in-One malware analysis tool integrated with Virus Total
RanSim
Ransomware simulation script. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
trivy
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
upload-bypass
File upload restrictions bypass, by using different bug bounty techniques!
vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
wapiti
Web vulnerability scanner written in Python3, read the wiki before use.
yara
The pattern matching swiss knife for Malware Lab