Rohit's Projects
command-line notes that I create randomly
后端架构师技术图谱
A collection of documented and undocumented AWS API models
A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.
An all-in-one-place collection of security information about all of the core AWS services.
Browser In The Browser (BITB) Templates
opinionated template to bootstrap a bastion host
can we hide from those willing to oppress us?
Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
dirty driving vue.js to build a simple license management dashboard
misc stuff for data engineering deployments, tasks, and various swiss-army-knife-type stuff
Collection of Cyber Threat Intelligence sources from the deep and dark web
eks cluster for devops tooling
Repository with text of DMCA takedown notices as received. GitHub does not endorse or adopt any assertion contained in the following notices. Users identified in the notices are presumed innocent until proven guilty. Additional information about our DMCA policy can be found at
very currency
A OSINT tool to obtain a target's phone number just by having his email address
An example of building a container and deploying it to ECS
手把手撕LeetCode题目,扒各种算法套路的裤子。English version supported! Crack LeetCode, not only how, but also why.
The next best thing after Bloomberg Terminal
Tools to perform basic search on GitHub.
💻📖 Laws, Theories, Principles and Patterns that developers will find useful. #hackerlaws