Ramesh Kumar N's repositories
Awesome-Cybersecurity-Datasets
A curated list of amazingly awesome Cybersecurity datasets
CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
DarkSpiritz
:moon: Official Repository for DarkSpiritz Penetration Framework | Written in Python :snake:
Gray-Hacker-Resources
👾Resources for CTFs and wargames, Cryptography, Forensics, Vulnerabilities and exploits, Reverse engineering, Web exploits, Post-exploration. For fun or profit. 👾
the-book-of-secret-knowledge
:zap: A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
attack-website
MITRE ATT&CK Website
awesome-threat-detection
A curated list of awesome threat detection and hunting resources
awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
AwesomeXSS
Awesome XSS stuff
bugcrowd-levelup-subdomain-enumeration
This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtual conference
HolisticInfoSec-For-WebDevelopers-Fascicle0
:books: Overview :lock: Tooling :lock: Process :lock: Physical :lock: People :books:
metasploit-framework
Metasploit Framework
mitm_relay
Hackish way to intercept and modify non-HTTP protocols through Burp & others.
Network-Intrusion-Detection
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15
pown-recon
A powerful target reconnaissance framework powered by graph theory.
SocialFish
Ultimate phishing tool. Socialize with the credentials.
the-art-of-subdomain-enumeration
This repository contains all the supplement material for the book "The art of sub-domain enumeration"
TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .