Satria Rizka's Projects
๐ A curated list of GitHub badges for your next project
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
List of Google Dorks for sites that have responsible disclosure program / bug bounty program
A community-powered collection of all known bug bounty platforms, vulnerability disclosure platforms, and crowdsourced security platforms currently active on the Internet.
Covenant is a collaborative .NET C2 framework for red teamers.
CScorza Web - Insieme di tutti gli strumenti OSINT e Digital Forensics
Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: CVE-2023-5360.
A simple bash and python script to check for the vulnerability CVE-2024-24919
Mass Exploit and Upload Targets
TOOLS DDOS PRIV8
List Bypass File Upload
้ไป่ดนไผๅ๏ผfofaๆฐๆฎ้้ๅทฅๅ
ท
Top disclosed reports from HackerOne
A quick tool for performing an export of your HackerOne program reports to ThreadFix
Project Bootcamp Lukananakit
Simple script to bulk check if IPs match networks
ini script Untuk Mengkomplikasi file python3 anda dengan komplikasi lambda rot 13 Berlapis 10 komplikasi
Masscanner for Laravel phpunit RCE CVE-2017-9841
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Universal port forwarding + VPN tool for windows based on SSH TCP tunneling.
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
PeTeReport is an open-source application vulnerability reporting tool.
php backdoors | php webshells ( collection )
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
More than 240 writeups for picoCTF challenges
A Powerful DDoS Tool For making Any Service DOWN, Also Included Proxies and Socks for Anonymization
Price Table created using HTML and CSS
Localroot Privelege escalation for linux
This is a Cryptographic tool built with PyQt5 and the cryptography library in Python. It enables users to encrypt and decrypt files and folders using a password. The user interface allows the user to browse for the file/folder, set a password, choose an operation (encrypt or decrypt), and select a directory to save the result.