Gamunu Karunarathna's repositories

juice-shop

OWASP Juice Shop: Probably the most modern and sophisticated insecure web application

License:MITStargazers:0Issues:0Issues:0

HackTools

The all-in-one browser extension for offensive security professionals 🛠

Stargazers:0Issues:0Issues:0

trivy

Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

License:Apache-2.0Stargazers:0Issues:0Issues:0
License:Apache-2.0Stargazers:0Issues:0Issues:0

cloudsploit

Cloud Security Posture Management (CSPM)

License:GPL-3.0Stargazers:0Issues:0Issues:0

trivy-operator

Kubernetes-native security toolkit

License:Apache-2.0Stargazers:0Issues:0Issues:0

ghidra

Ghidra is a software reverse engineering (SRE) framework

License:Apache-2.0Stargazers:0Issues:0Issues:0

PortSwigger-Lab-and-Burpsuite-Tutorial

It is a burpsuite introduction and these are 5 lab I performed in Burpsuite.

Stargazers:0Issues:0Issues:0

metasploit-framework

Metasploit Framework

License:NOASSERTIONStargazers:0Issues:0Issues:0

HardwareAllTheThings

Hardware/IOT Pentesting Wiki

License:MITStargazers:0Issues:0Issues:0

php-malware-finder

Detect potentially malicious PHP files

Language:PHPLicense:LGPL-3.0Stargazers:0Issues:0Issues:0

sliver

Cobalt Strike alternative

License:GPL-3.0Stargazers:0Issues:0Issues:0

Havoc

The Havoc Framework(C2 framework)

License:GPL-3.0Stargazers:0Issues:0Issues:0

free-for-dev

A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev

Stargazers:0Issues:0Issues:0

LOLBAS

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

License:GPL-3.0Stargazers:0Issues:0Issues:0

PayloadsAllTheThings

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

License:MITStargazers:0Issues:0Issues:0

DeTTECT

Detect Tactics, Techniques & Combat Threats

License:GPL-3.0Stargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

SecLists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

License:MITStargazers:0Issues:0Issues:0

GraphQLmap

GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)

License:MITStargazers:0Issues:0Issues:0

metasploitable3

Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.

License:NOASSERTIONStargazers:0Issues:0Issues:0

leonidas

Automated Attack Simulation in the Cloud, complete with detection use cases.

License:MITStargazers:0Issues:0Issues:0

cloud-wiki

A public cloud security knowledgebase - https://www.secwiki.cloud/

License:Apache-2.0Stargazers:0Issues:0Issues:0

Red-Teaming-Toolkit

This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.

License:GPL-3.0Stargazers:0Issues:0Issues:0

XAttackProV30

XAttacker Tool PRO V30 Website Vulnerability Scanner & Auto Exploiter

Stargazers:0Issues:0Issues:0

CEH-in-bullet-points

💻 Certified ethical hacker summary in bullet points

License:CC-BY-4.0Stargazers:0Issues:0Issues:0

awesome-threat-detection

✨ A curated list of awesome threat detection and hunting resources 🕵️‍♂️

Stargazers:0Issues:0Issues:0

awesome-oscp

A curated list of awesome OSCP resources

Stargazers:0Issues:0Issues:0

Burp-Suite-Certified-Practitioner-Exam-Study

Burp Suite Certified Practitioner Exam Study

Stargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0