Rushendra Rustam's repositories
awesome-chatgpt-prompts
This repo includes ChatGPT prompt curation to use ChatGPT better.
awesome-web-hacking
A list of web application security
CVE-2022-31101
Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)
CVE-2022-36446-Webmin-Software-Package-Updates-RCE
A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.
DashOverride
This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager
DeathSleep
A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.
Edge-Detect
Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".
blackeye
The ultimate phishing tool with 38 websites available!
evidential-deep-learning
Learn fast, scalable, and calibrated measures of uncertainty using neural networks!
fastonn
FastONN - Python based open-source GPU implementation for Operational Neural Networks
follina
All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence.
IDS
Created Network Intrusion Detection System using Pytorch
InfoSec-Black-Friday
All the deals for InfoSec related software/tools this Black Friday
introtodeeplearning
Lab Materials for MIT 6.S191: Introduction to Deep Learning
JuliaTutorials
Learn Julia via interactive tutorials!
MataElang-Platform
Mata Elang is the evolution of Mata Garuda Internet Monitoring Project for Indonesia. This project was initialized as private repository in 2018 by LabJarkomC307 - Politeknik Elektronika Negeri Surabaya. Currently, Mata Elang become one of collaboration research between PENS, Universitas Indonesia and BPPT.
MathWorks-Excellence-in-Innovation
Capstone and senior design project ideas for undergraduate and graduate students to gain practical experience and insight into technology trends and industry directions.
mit-deep-learning-book-pdf
MIT Deep Learning Book in PDF format (complete and parts) by Ian Goodfellow, Yoshua Bengio and Aaron Courville
mvt
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
MVTec-Anomaly-Detection
This project proposes an end-to-end framework for semi-supervised Anomaly Detection and Segmentation in images based on Deep Learning.
pegasus_spyware_detection_utils_ios_aos
After extensive research and understanding of how Pegasus Spyware is operating inside of iOS and AndroidOS systems I have created tools that will be able to identify & validate the presence of the spyware on your mobile devices, and tablets. Initial detection points were derived from the mvt-project.
Python-Deep-Learning-Second-Edition
Python Deep Learning Second Edition, Published by Packt
securityonion
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Top10
Official OWASP Top 10 Document Repository
training-seru
Training Cyberkarta untuk publik
tulisan-ctf
CTF writeup dari Cyberkarta
WhatWeb
Next generation web scanner
yolov7
Implementation of paper - YOLOv7: Trainable bag-of-freebies sets new state-of-the-art for real-time object detectors