Arafat Ansari's Projects
2022 POC
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A curated list of resources for creating applications with hyperledger fabric
A curated list of insanely awesome libraries, packages and resources for Quants (Quantitative Finance)
A curated list of awesome threat detection and hunting resources
Hotel Druid 3.0.3 Code Injection to Remote Code Execution
Monitoring exploits & references for CVEs
Damn Vulnerable Web Application Docker container
😎 Awesome lists about all kinds of interesting topics
:open_file_folder: :page_with_curl: A list of strictly flat-file cms systems
Community curated list of nuclei templates for finding unknown security vulnerabilities.
Compiled Binaries for Ghostpack (.NET v4.0)
The fastest dork scanner written in Go.
game of active directory
Attack surface mapping
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), artificial intelligence, vulnerability research, exploit development, reverse engineering, and more.
Impacket is a collection of Python classes for working with network protocols.
InfoSec Notes
This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.
Python & JAVA Solutions for Leetcode
LeetCode Problems' Solutions
Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration tests and vulnerability assessments too.
Community curated list of templates for the nuclei engine to find security vulnerabilities.
🔍NVD exploit & JVN(Japan Vulnerability Notes) easy description
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
Curated list of public penetration test reports released by several consulting firms and academic security groups