Giter VIP home page Giter VIP logo

Mohit's Projects

file-upload-xss icon file-upload-xss

HTML5 Security Cheatsheet - A collection of HTML5 related XSS attack vectors

firebasescanner icon firebasescanner

The scripts helps security analsts to identify misconfigured firebase instances.

firmadyne icon firmadyne

System for emulation and dynamic analysis of Linux-based firmware

flask-unsign icon flask-unsign

Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.

gadgetprobe icon gadgetprobe

Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.

h8mail icon h8mail

Password Breach Hunting and Email OSINT tool, locally or using premium services. Supports chasing down related email

hashcatch icon hashcatch

Capture handshakes of nearby WiFi networks automatically

hidden-cry icon hidden-cry

Windows Crypter/Decrypter Generator with AES 256 bits key

hopla icon hopla

HopLa Burp Suite Extender plugin - Adds autocompletion support and useful payloads in Burp Suite

htshells icon htshells

Self contained htaccess shells and attacks

injuredandroid icon injuredandroid

A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.

insecure-firebase-exploit icon insecure-firebase-exploit

A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the app have set the security rules as true for both "read" & "write" an attacker can probably dump database and write his own data to firebase db.

intruderpayloads icon intruderpayloads

A collection of Burpsuite Intruder payloads, fuzz lists and file uploads

jexboss icon jexboss

JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool

jok3r icon jok3r

Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework

keyhacks icon keyhacks

Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.

keyspark icon keyspark

Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.

komorebi icon komorebi

A beautiful and customizable wallpapers manager for Linux

kube-bench icon kube-bench

Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark

kube-hunter icon kube-hunter

Hunt for security weaknesses in Kubernetes clusters

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.