Budi Komarudin's repositories
iredmail-docker
Dockerize the iRedMail image with minimal error issues.
OSEP-Code-Snippets
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
wifijammer
Continuously jam all wifi clients/routers
apko
Build OCI images from APK packages directly without Dockerfile
brakeman
A static analysis security vulnerability scanner for Ruby on Rails applications
Chimay-Red
Working POC of Mikrotik exploit from Vault 7 CIA Leaks
distrobuilder
System container image builder for LXC and Incus
docker-routeros
Mikrotik RouterOS inside Docker container
frp
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
gtfobins
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Windows Driver
horusec
Horusec is an open source tool that improves identification of vulnerabilities in your project with just one command.
Invoke-Mimikatz-Bypass
This script dynamically decodes and executes a Base64 encoded Mimikatz script, allowing users to bypass security measures and run specified Mimikatz commands.
MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
meltdown
This repository contains several applications, demonstrating the Meltdown bug.
MHDDoS
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Microsoft-Activation-Scripts
A Windows and Office activator using HWID / Ohook / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
OSED
Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)
OSWE
OSWE Preparation
PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
routeros
RouterOS Security Research Tooling and Proof of Concepts
swaggervs
Swagger Vulnerability Scanner
Terminator
Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes
tpotce
🍯 T-Pot - The All In One Honeypot Platform 🐝
vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
Vulnerable-API
The Vulnerable API Python Application is a purposely flawed Python app that uses Flask, Jinja, and SQLite3. It contains intentional security vulnerabilities like XSS, SQLi, HHI, LFI, RFI, and SSTI. The project aims to serve as an educational tool to learn about and test automated API scanners. Use responsibly in controlled environments only.
xsshunter-go
XSSHunter written in Go with more notifications and features