Sajibe Kanti's Projects
The "bot" component of the PlugBot project
PMSCS Program in Jahangirnagar University
Proofs-of-concept
pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.
Find exploit tool
Next Generation Point Of Sale Application
Point of sale system
PowerShell - Rapid Response... For the incident responder in you!
🐙 Cross-document Messaging security research tool
Remote Desktop entirely coded in PowerShell.
PPTP VPN Installer Script { Tested in Centos 7 }
Collect data to predict Covid-19 patient by observing the physical condition of 1000 people, it will be predicted whether COVID-19 is positive or negative.
Prestashop Module for SSLCOMMERZ Payment Gateway.
A Report Generation Tool for Security Assessment
ফেসবুক ভিত্তিক গ্রুপঃ প্রোগ্রামিং প্রবলেম (Programming Problem in Bengali) । এই গ্রুপের বিভিন্ন গুরুত্বপূর্ণ ডকুমেন্টসগুলো এই রিপোজিটরিতে সংযুক্ত হতে থাকবে।
Contains a list of security related Rust projects.
Vulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb
Curated list of public penetration test reports released by several consulting firms and academic security groups
bug bounty disclosed reports
Puma Scan is a software security Visual Studio extension that provides real time, continuous source code analysis as development teams write code. Vulnerabilities are immediately displayed in the development environment as spell check and compiler warnings, preventing security bugs from entering your applications.
📖 A collection of pure bash alternatives to external processes.
Ruby on Rails POS (Point of Sale)
My roadmap for preparing for OSCP, anyone is free to use this and also feedback and contributions are welcome
Pentest Report Generator
A simple python wrapper for the Firebase API.
Downloads all files from specified Facebook group
Tool to look for several security related Android application vulnerabilities
Quack Toolkit is a set of a denial of service attack methods. Quack includes SMS attack method, HTTP attack method and many other attack methods.