Git Product home page Git Product logo

Hello there -General Kenobi

šŸ¤–

I am an Offensive Security Researcher, Infosec Trainer, Gamer & Doodle artist.

  • šŸ”­ Iā€™m currently working on ...Red Teaming, Web App, API, Android Static & Network Penetration Testing
  • šŸŒ± Iā€™m currently learning ...Android PT, Code Review & Cloud PT
  • šŸ‘Æ Iā€™m looking to collaborate on ...Research, Tools, Bug Bounty & Mentoring/Speaker
  • šŸ¤” Iā€™m looking for help with ...Bug Bounty Automation
  • šŸ’¬ Ask me about ...My day, Work, DC & Hacking
  • šŸ“« How to reach me: ...[email protected]
  • šŸ˜„ Pronouns: ...he/his/him
  • āš” Qoute: ...Aren't we all here to make a difference?

Pratyaksh Singh's Projects

my-checklist- icon my-checklist-

The focus of this cheat sheet is infrastructure,network penetration testing and web application penetration testing Perform.

nuclei-templates icon nuclei-templates

Community curated list of templates for the nuclei engine to find security vulnerabilities.

os-projectq16 icon os-projectq16

Design a scheduler that can schedule the processes arriving system at periodical intervals. Every process is assigned with a fixed time slice t milliseconds. If it is not able to complete its execution within the assigned time quantum, then automated timer generates an interrupt. The scheduler will select the next process in the queue and dispatcher dispatches the process to processor for execution. Compute the total time for which processes were in the queue waiting for the processor. Take the input for CPU burst, arrival time and time quantum from the user.

pentest-guide icon pentest-guide

Penetration tests guide based on OWASP including test cases, resources and examples.

python icon python

All Algorithms implemented in Python

reconftw icon reconftw

reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities

reconnote icon reconnote

Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters

reconology icon reconology

"A proper recon is 50 percentage of Penetration Testing done."- Following this phrase I create this repository where I write down things I learn about recon, the implementation, to narrow down the target scope.

scant3r icon scant3r

ScanT3r - Bug bounty automation tool

subjack icon subjack

Subdomain Takeover tool written in Go

svgxss icon svgxss

This repo contains SVG file which has xss payload in it.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    šŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. šŸ“ŠšŸ“ˆšŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ā¤ļø Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.