Ramesh Kumar N (snrtherock)

snrtherock

Geek Repo

Company:Databrakets

Github PK Tool:Github PK Tool

Ramesh Kumar N's repositories

Awesome-Cybersecurity-Datasets

A curated list of amazingly awesome Cybersecurity datasets

CheatSheetSeries

The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.

Language:PythonLicense:NOASSERTIONStargazers:1Issues:2Issues:0

DarkSpiritz

:moon: Official Repository for DarkSpiritz Penetration Framework | Written in Python :snake:

Language:PythonLicense:MITStargazers:1Issues:2Issues:0

Gray-Hacker-Resources

👾Resources for CTFs and wargames, Cryptography, Forensics, Vulnerabilities and exploits, Reverse engineering, Web exploits, Post-exploration. For fun or profit. 👾

Language:CLicense:MITStargazers:1Issues:2Issues:0

the-book-of-secret-knowledge

:zap: A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.

License:GPL-3.0Stargazers:1Issues:2Issues:0

attack-website

MITRE ATT&CK Website

Language:HTMLStargazers:0Issues:2Issues:0

awesome-threat-detection

A curated list of awesome threat detection and hunting resources

Stargazers:0Issues:2Issues:0

awesome-threat-intelligence

A curated list of Awesome Threat Intelligence resources

License:Apache-2.0Stargazers:0Issues:2Issues:0

AwesomeXSS

Awesome XSS stuff

Language:JavaScriptLicense:MITStargazers:0Issues:2Issues:0

Bolt

CSRF Scanner

Language:PythonLicense:GPL-3.0Stargazers:0Issues:2Issues:0

bugcrowd-levelup-subdomain-enumeration

This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtual conference

Language:PythonStargazers:0Issues:1Issues:0

Cr3dOv3r

Know the dangers of credential reuse attacks.

Language:PythonLicense:MITStargazers:0Issues:1Issues:0

HolisticInfoSec-For-WebDevelopers-Fascicle0

:books: Overview :lock: Tooling :lock: Process :lock: Physical :lock: People :books:

Stargazers:0Issues:1Issues:0

htcap

htcap is a web application scanner able to crawl single page application (SPA) in a recursive manner by intercepting ajax calls and DOM changes.

Language:PythonLicense:GPL-2.0Stargazers:0Issues:2Issues:0

IPOsint

Discovery IP Address of the target

Language:PythonStargazers:0Issues:2Issues:0

killshot

A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner

Language:RubyStargazers:0Issues:2Issues:0

metasploit-framework

Metasploit Framework

Language:RubyLicense:NOASSERTIONStargazers:0Issues:2Issues:0

mitm_relay

Hackish way to intercept and modify non-HTTP protocols through Burp & others.

Language:PythonLicense:Apache-2.0Stargazers:0Issues:1Issues:0

Network-Intrusion-Detection

Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15

Language:PythonStargazers:0Issues:2Issues:0
License:CC-BY-SA-4.0Stargazers:0Issues:2Issues:0

pOSINT

Gather Open-Source Intelligence using PowerShell.

Language:PowerShellLicense:MITStargazers:0Issues:2Issues:0

pown-recon

A powerful target reconnaissance framework powered by graph theory.

Language:JavaScriptLicense:MITStargazers:0Issues:2Issues:0

ptf

The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.

Language:PythonStargazers:0Issues:2Issues:0

Remot3d

Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a system or server that runs a PHP program language ...

Language:ShellLicense:GPL-3.0Stargazers:0Issues:2Issues:0

SocialFish

Ultimate phishing tool. Socialize with the credentials.

Language:HTMLLicense:BSD-3-ClauseStargazers:0Issues:2Issues:0

the-art-of-subdomain-enumeration

This repository contains all the supplement material for the book "The art of sub-domain enumeration"

Language:PythonStargazers:0Issues:1Issues:0

TheFatRat

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .

Language:JavaLicense:GPL-3.0Stargazers:0Issues:2Issues:0

u2f-zero

U2F USB token optimized for physical security, affordability, and style

Language:CLicense:NOASSERTIONStargazers:0Issues:1Issues:0

XSRFProbe

The Prime Cross Site Request Forgery Audit and Exploitation Toolkit.

Language:PythonLicense:GPL-3.0Stargazers:0Issues:2Issues:0