Hackwithvyshu 's repositories
kochi-workshop-09-23
notes for Kochi workshop 09-13
CEH-Exam-Questions
Planning To Take Certified Ethical Hacker (CEH)? Here are github repo with 125 questions and answers to help you prep for the test
DefectDojo
DefectDojo is a DevSecOps and vulnerability management tool.
spiderfoot
SpiderFoot automates OSINT collection so that you can focus on analysis.
8821au-kallinux
Linux Driver for USB WiFi Adapters that are based on the RTL8811AU and RTL8821AU Chipsets - v5.12.5.2
AMSITrigger
The Hunt for Malicious Strings
apache-superset
Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset
cupp
Common User Passwords Profiler (CUPP)
domain-checker
Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydrattack.com), the main idea of which is, based only on the domain name, find almost all of the subdomains and their top 100 open ports
ducky2arduino
ducky to arduino converter
duckyPad
Do-It-All Mechanical Macropad
Fast-Google-Dorks-Scan
The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widespread file types and path traversal. The 100% automated.
malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
PowerJoker
A random powershell Reverse-Shell in each execution taking LHOST/LPORT
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
UACME
Defeating Windows User Account Control
upload-bypass
File upload restrictions bypass, by using different bug bounty techniques!