Giter Site home page Giter Site logo

HI, I'm Balthazzar.H

I'm a Cybersecurity Enthusiast.

  • 👋 Hi,
  • 👀 I’m interested in Cybersecurity
  • 🌱 I’m currently learning post exploitation
  • 💞️ I’m looking to collaborate on Pentesting, Cracking, Bug Bounties and Exploitation
  • 📫 How to reach me:

Anurag's GitHub stats

balthazzarhewlett's Projects

airgeddon icon airgeddon

This is a multi-use bash script for Linux systems to audit wireless networks.

anonsurf icon anonsurf

A port of ParrotSec's stealth and anonsurf modules to Kali Linux

awesome-security icon awesome-security

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

big-list-of-naughty-strings icon big-list-of-naughty-strings

The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.

burpy icon burpy

Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the module provided and finally generate a HTML report.

bypass-403 icon bypass-403

A simple script just made for self use for bypassing 403

config_killer icon config_killer

Script written in bash to identify and dump services config files

crypto-signal icon crypto-signal

Github.com/CryptoSignal - #1 Quant Trading & Technical Analysis Bot - 2,100 + stars, 580 + forks

duplicut icon duplicut

Remove duplicates from MASSIVE wordlist, without sorting it (for dictionnary-based password cracking)

exploit-project icon exploit-project

List and description of various program expoits and system vulnerabilities

firebase icon firebase

Exploiting misconfigured firebase databases

ghunt icon ghunt

🕵️‍♂️ Investigate Google Accounts with emails.

grinder icon grinder

:mag_right: Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)

ig-brute icon ig-brute

Instagram brute forcing tool de-buged for kali llinux + termux ....etc

invisible-login-forms icon invisible-login-forms

Stealing user credentials by injecting invisible login forms that the native browser autofills data to. More info: https://freedom-to-tinker.com/2017/12/27/no-boundaries-for-user-identities-web-trackers-exploit-browser-login-managers/

ipgeo icon ipgeo

Retrieve IP Geolocation information

joomla_rce_cve-2015-8562 icon joomla_rce_cve-2015-8562

All versions of the Joomla! below 3.4.6 are known to be vulnerable. But exploitation is possible with PHP versions below 5.5.29, 5.6.13 and below 5.5.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.