Name: alwanwijaya
Type: User
Bio: Hello, my name is lowanz, welcome to my github account, don't hesitate to clone this repository because it's taken from my public :) don't forget to star, π¦π
Twitter: wanzroot
Location: Asia,Indonesia,Jakarta
alwanwijaya's Projects
Active Directory ACL exploitation with BloodHound
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
A malicious Apache module with rootkit functionality
A python script to scan for Apache Tomcat server vulnerabilities.
Open-Source Remote Administration Tool For Windows C# (RAT)
Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
BLACKHAT USA2022 PDF Public
BUG BOUNTY WRITEUPS - OWASP TOP 10 π΄π΄π΄π΄β
A list of interesting payloads, tips and tricks for bug bounty hunters.
Automated All-in-One OS Command Injection Exploitation Tool.
List of Computer Science courses with video lectures.
Toolset for automating common management actions used in CTF's
CVE-2021-4034 1day
PoC for PwnKit: Local Privilege Escalation Vulnerability in polkitβs pkexec (CVE-2021-4034)
CVE-2021-4154 exploit
Apache Spark Shell Command Injection Vulnerability
Cybersecurity Career Path
List of Github repositories and articles with list of dorks for different search engines
Your scrcpy companion for Android wireless screen mirroring
Various ways to execute shellcode
GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).
Useful Google Dorks for WebSecurity and Bug Bounty
:information_source: GRUB Themes with the theme from the anime The Quintessential Quintuplets, Fate Series, and VTuber Hoshimati Suisei :computer: :heart:
An unconventional Windows reverse shell, currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic.
Tutorials and Things to Do while Hunting Vulnerability.
Impacket is a collection of Python classes for working with network protocols.
Knock Subdomain Scan
Linux privilege escalation auditing tool
Linux PAM Backdoor