Rahuldeep singh's repositories
adfs_cloner
A python approach to enumerate for and clone ADFS user portals
AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Buffer_Overflow
Don't let buffer overflows overflow your mind
cheat-sheets
all my cheat files
chip
Change IP Address in Every 30 seconds[Anonymous Mode]
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Crackmes
Repository for Binary Reverse Engineering exercises.
CVE-2006-3392
Webmin < 1.290 / Usermin < 1.220 - Arbitrary File Disclosure (Python3)
FYI
My last 10 year's material collection on offensive & defensive security, GRC, risk management, technical security guidelines and much more.
Invoke-PSObfuscation
An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.
KatanaFramework
The New Hacking Framework
maldev-for-dummies
A workshop about Malware Development
MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
MXEnum
A simple script to enumerate MX records from an email address
nmapAutomator
A script that you can run in the background!
OSCP-A-Step-Forward
Opening the door, one reverse shell at a time
OSEP-Breaking-Chains
A collection of code snippets built to assist with breaking chains.
OSWE-crawling-through-the-webs
Becoming the spider, crawling through the webs to catch the fly.
Pentest-Cheat-Sheets
A collection of snippets of codes and commands to make your life easier!
pentest-wiki
PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
persistent_backdoor-Linux
Persistence backdoor for Linux
pythonizing_nmap
A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.
RCE_Web_Shell_Python
A python approach to interacting with web shells.
spawning_access_points
Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.
TripleCross
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.