lohith's repositories
awesome-sec-talks
A collected list of awesome security talks
Android-Reports-and-Resources
A big list of Android Hackerone disclosed reports and other resources.
api-pentesting
API Pentesting notes.
automatic-api-attack-tool
Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an output.
awesome-bug-bounty
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
Awesome-Bugbounty-Writeups
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
awesome-burp-extensions
A curated list of amazingly awesome Burp Extensions
awesome-ctf
A curated list of CTF frameworks, libraries, resources and softwares
awesome-ml-for-cybersecurity
:octocat: Machine Learning for Cyber Security
bug-bounty-platforms
A community-powered collection of all known bug bounty platforms, vulnerability disclosure platforms, and crowdsourced security platforms currently active on the Internet.
Bug-Bounty-Roadmaps
Bug Bounty Roadmaps
CTFs
Writeups & Walkthroughs of various CTF challenges and boxes
DeepLearningFlappyBird
Flappy Bird hack using Deep Reinforcement Learning (Deep Q-learning).
h2csmuggler
HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
ISLR-python
An Introduction to Statistical Learning (James, Witten, Hastie, Tibshirani, 2013): Python code
javascript-bootcamp
A Bootcamp covering most of the javascript concepts.
JNDI-Exploit-Kit
JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps vulnerable to JNDI Injection)
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
PrivescCheck
Privilege Escalation Enumeration Script for Windows
rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
Swagger-EZ
A tool geared towards pentesting APIs using OpenAPI definitions.
teched2020-DAT160
DAT160 - Cloud Native Development with SAP HANA
vulnerable-code
test