Giter VIP home page Giter VIP logo

💫 About Me:

I'm a passionate cybersecurity engineer with a keen interest in web and mobile application security. I love to dive into the intricacies of systems to uncover vulnerabilities and find innovative solutions to protect against cyber threats.

My Expertise

  • Web Application Security
  • Mobile Application Security
  • Penetration Testing
  • Vulnerability Assessment
  • Threat Modeling
  • Secure Coding Practices

💻 Tech Stack:

HTML5 PHP Python Shell Script PowerShell JavaScript Go

📊 GitHub Stats:



Random Dev Meme


[

Abdel Rhman Anter's Projects

dumpit icon dumpit

An exploit for SHAREit <= v 4.0.38

dwarf icon dwarf

Full featured multi arch/os debugger built on top of PyQt5 and frida

gf-patterns icon gf-patterns

GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep

githacker icon githacker

🕷️ A Git source leak exploit tool that restores the entire Git repository, including data from stash, for white-box auditing and analysis of developers' mind

konan icon konan

Konan - Advanced Web Application Dir Scanner

malware-samples icon malware-samples

A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net

malwaresearch icon malwaresearch

A command line tool to find malwares on http://openmalware.org

ms-dos icon ms-dos

The original sources of MS-DOS 1.25 and 2.0, for reference purposes

one-lin3r icon one-lin3r

Gives you one-liners that aids in penetration testing operations, privilege escalation and more

oneforall icon oneforall

OneForAll是一款功能强大的子域收集工具

pcileech icon pcileech

Direct Memory Access (DMA) Attack Software

photon icon photon

Incredibly fast crawler designed for OSINT.

privilege-escalation icon privilege-escalation

This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.

python-sec-lib icon python-sec-lib

The "bane" Python library stands out as a robust toolkit catering to a wide spectrum of cybersecurity and networking tasks. Its versatile range of functionalities covers various aspects, including bruteforce attacks, cryptographic methods, DDoS attacks, information gathering, botnet creation and management, and CMS vulnerability scanning and more..

qrljacking icon qrljacking

QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR code” feature as a secure way to login into accounts which aims for hijacking users session by attackers.

r3d-buck3t icon r3d-buck3t

Penetration Testing, Vulnerability Assessment and Red Team Learning

re-ios-apps icon re-ios-apps

A completely free, open source and online course about Reverse Engineering iOS Applications.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.