Git Product home page Git Product logo

Bijay limbu senihang's Projects

chipsec icon chipsec

Platform Security Assessment Framework

chromebackdoor icon chromebackdoor

Chromebackdoor is a pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malicious extension or script on most popular browsers, and send all DOM datas on command and control.

cloudflair icon cloudflair

๐Ÿ”Ž Find origin servers of websites behind by CloudFlare using Internet-wide scan data from Censys.

cobra icon cobra

Cobra๏ผˆ็œผ้•œ่›‡๏ผ‰ - Static code security scanner & analyser (็™ฝ็›’ไปฃ็ ๅฎ‰ๅ…จๆ‰ซๆไธŽๅˆ†ๆž็ณป็ปŸ)

codewarrior icon codewarrior

Just another manual code analysis tool and static analysis tool

codex-backend icon codex-backend

CodexGigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in malware hunting.

coffeeminer icon coffeeminer

collaborative (mitm) cryptocurrency mining pool in wifi networks

combine icon combine

Tool to gather Threat Intelligence indicators from publicly available sources

crawlpy icon crawlpy

Scrapy python crawler/spider with post/get login (handles CSRF), variable level of recursions and optionally save to disk

crazyparser icon crazyparser

Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.

cs-suite icon cs-suite

Cloud Security Suite - One stop tool for auditing the security posture of AWS infrastructure.

css-keylogging icon css-keylogging

Chrome extension and Express server that exploits keylogging abilities of CSS.

ctf-literature icon ctf-literature

Collection of free books, papers and articles related to CTF challenges.

ctf-tools icon ctf-tools

Some setup scripts for security research tools.

cuckoosploit icon cuckoosploit

An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.

cutter icon cutter

A Qt and C++ GUI for radare2 reverse engineering framework

cve-2017-11882-metasploit icon cve-2017-11882-metasploit

This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.

cve-2017-12617 icon cve-2017-12617

Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution

cyberattack-event-collector icon cyberattack-event-collector

Tool to collect cyber attack events that Norse tracks (http://map.norsecorp.com) and persist it into locally running MongoDB instance that can be later used for analysis

cyberprobe icon cyberprobe

Capturing, analysing and responding to cyber attacks

cybot icon cybot

Open Source Threat Intelligence Chat Bot

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.