GithubHelp home page GithubHelp logo

ashkal aidid's Projects

cub3 icon cub3

Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.

cupp icon cupp

Common User Passwords Profiler (CUPP)

cursatetra icon cursatetra

Terminal-bounded block-based puzzle game written in Python/Curses

cutter icon cutter

Free and Open Source Reverse Engineering Platform powered by radare2

cuttlefish icon cuttlefish

Transactional email server with a lovely web interface

cve-2018-20250 icon cve-2018-20250

exp for https://research.checkpoint.com/extracting-code-execution-from-winrar

cve-2019-11708 icon cve-2019-11708

Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.

cve-2020-5902-scanner icon cve-2020-5902-scanner

Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.

cve-search icon cve-search

cve-search - a tool to perform local searches for known vulnerabilities

cvechecker icon cvechecker

Command-line utility to scan the system and report on potential vulnerabilities, based on public CVE data

cvemon icon cvemon

Monitoring exploits & references for CVEs

cyb icon cyb

🌎 Personal immortal robot for the The Great Web

cyber_phoenix_lock_hack icon cyber_phoenix_lock_hack

Hacklock is a bash based script which is officially termux from this tool in just one click you can generate pattern phishing tool which can hack victim pattern and. This tool works on both rooted Android device and Non-rooted Android device.

cyberchef icon cyberchef

The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis

cypher icon cypher

Pythonic ransomware proof of concept.

d-tect icon d-tect

# D-TECT D-TECT - Pentest the Modern Web Author: [Shawar Khan] (https://shawarkhan.com/about/) Disclaimer: I am not responsible for any damage done using this tool. This tool should only be used for educational purposes and for penetration testing. ###Compatibility: * Any platform using Python 2.7 ###Requirements: * Python 2.7 * Modules(included): Colorama, BeautifulSoup ###Description: **D-TECT** is an All-In-One Tool for Penetration Testing. This is specially programmed for Penetration Testers and Security Researchers to make their job easier, instead of launching different tools for performing different task. **D-TECT** provides multiple features and detection features which gather target information and finds different flaws in it. ###Features: * Sub-domain Scanning * Port Scanning * Wordpress Scanning * Wordpress Username Enumeration * Wordpress Backup Grabbing * Sensitive File Detection * Same-Site Scripting Scanning * Click Jacking Detection * Powerful XSS vulnerability scanning * SQL Injection vulnerability scanning * User-Friendly UI ###Usage: python d-tect.py #Screenshots: ###Menu: ![Menu](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/menu.png) ###Banner Grabbing: ![Banner Grabbing](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/banner.png) ###Click Jacking Detection: ![Click Jacking](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/clickjacking.png) ###Port Scanner: ![Port Scanner](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/portscan.png) ###WP Backup Grabber: ![WP Backup Grabber](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/backup.png) ###Sensitive File Detection: ![File Detection](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/filedetection.png) ###Cross-Site Scripting [ XSS ] Scanner: ![XSS Scanner](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/xss.png) ###SQL Injection [ SQLI ] Scanner: ![SQLI Scanner](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/sqli.png) ###Sub-domain Scanner: ![Sub-Domain Scanner](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/subdomain.png) ###WP Username Enumeration: ![WP Username Enumeration](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/usernameenumeration.png) ###Same Site Scripting detection: ![Same-Site Scripting](https://raw.githubusercontent.com/shawarkhanethicalhacker/D-TECT/master/Screenshots/samesitescripting.jpeg) # Special Thanks To: * Curt Smith * Tayyab Qadir * Mugees Ahmad

d4rkxss icon d4rkxss

A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.