Vaibhav Mishra's Projects
A guide on how to become an Information (or Cyber) Security Professional. With resources from free to expensive.
Use Android as Rubber Ducky against another Android device
EPICS Project
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
A collection of various awesome lists for hackers, pentesters and security researchers
This Repo contains all tools that are required in Ethical Hacking organized in specific categories.
:scream: A curated list of amazingly awesome OSINT
Awesome Ruby Security resources
š A collection of interesting, funny, and depressing search queries to plug into shodan.io š©āš»
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
A Collection of Notes, Methodologies, POCs and everything else related to Bug Hunting.
A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or setup with Docker.
ā” Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ā”
Shell script to obtain information from https://crt.sh
My learnings and experience of CTF solving.
eLearnSecurity Certified Exploit Development
Facebook Bug Bounties
Go scripts for finding an API key / some keywords in repository
Gotator is a tool to generate DNS wordlists through permutations.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Pawan Kumar Portfolio
Impacket is a collection of Python classes for working with network protocols.
Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.
List of materials on which to learn IoT/IIoT Security
Go scripts for checking API key / access token validity
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
This Repo contains resource for Malware Analysis, Incident Response, Threat Intelligence, Threat Hunting