Ishaq Mohammed's Projects
By hooking into the pre-push hook provided by Git, Talisman validates the outgoing changeset for things that look suspicious - such as authorization tokens and private keys.
The Bug Hunters Methodology
Telegram Messenger for iOS
The JavaScript Way book
A repository of LIVE malwares for your own joy and pleasure
This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories which are in their own, different modules required for threat hunting. This repo will be updated as and when new changes are made.
A tiny and cute URL fuzzer
security and hacking tools, exploits, proof of concepts, shellcodes, scripts
Searches through git repositories for high entropy strings and secrets, digging deep into commit history
Twitter auto follow/unfollow
πͺBrowser logic-based vulnerabilities DB :skull_and_crossbones:
vFeed - The Correlated Vulnerability And Threat Database
Hacking as per the book
Demo of a Vue.js app that mixes both clientside templates and serverside templates leading to an XSS vulnerability
Wargaming challenges write-ups
Web CTF CheatSheet π
Generic Command Exploitation Engine for exploiting web application command-injection bugs,.
Test suites for Web-platform specs β including WHATWG, W3C, and others
Web-Security-Learning
Web Application Security
Dynamic Application Security Test Orchestration (DASTO)
A list of well written documentation I've come across
Web application bruteforcer
An attempt to answer the age old interview question "What happens when you type google.com into your browser and press enter?"