Roxanna's Projects
In-depth Attack Surface Mapping and Asset Discovery
A collection of ZSH frameworks, plugins, themes and tutorials.
The source for REST API specifications for Microsoft Azure.
Code Scanning/SAST/Static Analysis/Linting using many tools/Scanners with One Report (Code, IaC) - Betterscan Community Edition (CE)
A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.
🎯 Command Injection Payload List
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]
DevSkim is a set of IDE plugins, language analyzers, and rules that provide security "linting" capabilities.
Ghidra is a software reverse engineering (SRE) framework
Beginner Hello World Repository
Impacket is a collection of Python classes for working with network protocols.
Programming in C#
ASP.NET MVC framework
T-SQL query fundamentals
continuation of C# programming and ASP.NET MVC
Over 250 terminal color schemes/themes for iTerm/iTerm2. Includes ports to Terminal, Konsole, PuTTY, Xresources, XRDB, Remmina, Termite, XFCE, Tilda, FreeBSD VT, Terminator, Kitty, MobaXterm, LXTerminal, Microsoft's Windows Terminal, Visual Studio, Alacritty
Microsoft Drivers for PHP for SQL Server
The Microsoft JDBC Driver for SQL Server is a Type 4 JDBC driver that provides database connectivity with SQL Server through the standard JDBC application program interfaces (APIs).
Node.js JavaScript runtime :sparkles::turtle::rocket::sparkles:
SDK for developing enclaves
TLS/SSL and crypto library
Python code shared by Scout2 and AWS-Recipes
Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to Infosec community.
Awesome Pentest Tools Collection
A reviewed list of useful PHP static analysis tools
Kali Linux Fixes for Newly Imported VM's
PowerShell MachineAccountQuota and DNS exploit tools
PowerSploit - A PowerShell Post-Exploitation Framework
Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course