Saad Bin Saleem's repositories
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
personal-website
This is just an old personal website for testing purpose.
DevSecOps-Playbook
This is a step-by-step guide to implementing a DevSecOps program for any size organization
social-engineer-toolkit
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Windows Driver
gmetrics
The GMetrics project provides calculation and reporting of size and complexity metrics for Groovy source code. GMetrics scans Groovy source code, applying a set of metrics, and generates an HTML report of the results.
MITRE-ATT-CK-Mappings
This project empowers defenders with independent data on which native security controls of leading technology platforms are most useful in defending against the adversary TTPs they care about.
hackingtool
ALL IN ONE Hacking Tool For Hackers
awesome-docker
:whale: A curated list of Docker resources and projects
sbinsaleem
Config files for my GitHub profile.
kubernetes-goat
Kubernetes Goat 🐐 is a "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security 🔐
trivy
Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
DVWA
Damn Vulnerable Web Application (DVWA)
sqlmap
Automatic SQL injection and database takeover tool
community
Repository of modules and signatures contributed by the community
api-firewall
Fast and light-weight API proxy firewall for request and response validation by OpenAPI specs.
docker-wallarm-node
⚡️ Docker official image for Wallarm Node. API security platform agent.
Smap
a drop-in replacement for Nmap powered by shodan.io
phpMussel
PHP-based anti-virus anti-trojan anti-malware solution.
helm-charts
Wallarm public charts repository
Gmail-Brute
A tool to brute force a gmail account. Use this tool to crack multiple accounts. This tool is developed to crack multiple accounts
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
ansible-labs
Labs for Ansible used in Dice DevOps course
CertificationMaterials
A collection of materials related to my certification videos