Gustavo Rosas's Projects
Attack and defend active directory using modern post exploitation adversary tradecraft activity
In-depth attack surface mapping and asset discovery
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.
Initial base for creating fully modularized Bootstrap with Flask web applications. Start off on the right foot!
Initial base for creating fully modularized Flask web applications. Start off on the right foot!
Initial base for creating fully modularized Python projects with MySQL connection. Start off on the right foot!
BBT - Bug Bounty Tools (examples💡)
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)
The scripts I write to help me on my bug bounty hunting
The tools I have programmed to help me with bugbounty's
A list of interesting payloads, tips and tricks for bug bounty hunters.
Bug Bounty Bot is a Discord bot created to assist hackers with common tactics, techniques, and procedures while tackling multiple programs.
Master programming by recreating your favorite technologies from scratch.
Extension
this is it, 𝗖𝗿𝗮𝘅𝘀𝗥𝗮𝘁 is here. In the forum we've promise to share the iOS source code attack ( IPA's ), but since this repo already published, we've would just kept it awhile, thank you for understanding.
real time face swap and one-click video deepfake with only a single image
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Ethical Hacking
Powerful yet simple to use screenshot software :desktop_computer: :camera_flash:
Find leaked secrets via github search
Useful Google Dorks for WebSecurity and Bug Bounty
Open-Source Phishing Toolkit
Esse guia contém todas as informações necessárias para se introduzir na área de segurança da informação, dessa maneira, você encontrará, cursos, indicações de livros, roadmaps, playlists, certificações e demais outras coisas.
AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code analysis and scan analysis.