Git Product home page Git Product logo

AjaySinghNegi's Projects

altoroj icon altoroj

WARNING: This app contains security vulnerabilities. AltoroJ is a sample banking J2EE web application. It shows what happens when web applications are written with consideration of app functionality but not app security. It's a simple and uncluttered platform for demonstrating and learning more about real-life application security issues.

androbugs_framework icon androbugs_framework

AndroBugs Framework is an efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. No need to install on Windows.

androguard icon androguard

Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)

api-security-checklist icon api-security-checklist

Checklist of the most important security countermeasures when designing, testing, and releasing your API

archerysec icon archerysec

Open Source Vulnerability Assessment and Management helps developers and pentesters to perform scans and manage vulnerabilities.

awesome-bug-bounty icon awesome-bug-bounty

A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.

awesome-cyber-skills icon awesome-cyber-skills

A curated list of hacking environments where you can train your cyber skills legally and safely

awesome-pentest icon awesome-pentest

A collection of awesome penetration testing resources, tools and other shiny things

awesome-security icon awesome-security

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

cuckoo icon cuckoo

Cuckoo Sandbox is an automated dynamic malware analysis system

cve-2017-0199 icon cve-2017-0199

Exploit toolkit CVE-2017-0199 - v3.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious (Obfuscated) RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.

datasploit icon datasploit

A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitoring on the data.

fridpa icon fridpa

An automated wrapper script for patching iOS applications (IPA files) and work on non-jailbroken device

glue icon glue

Application Security Automation

jackhammer icon jackhammer

Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.

lambhack icon lambhack

A very vulnerable serverless application in AWS Lambda

mobileapp-pentest-cheatsheet icon mobileapp-pentest-cheatsheet

The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.