Siddharth Gupta's Projects
All about bug bounty (bypasses, payloads, and etc)
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails,
APIKit:Discovery, Scan and Audit APIs Toolkit All In One.
Scanning APK file for URIs, endpoints & secrets.
anything
AWSGoat : A Damn Vulnerable AWS Infrastructure
Bug Bounty Roadmaps
Project that generates Malicious Office Macro Enabled Dropper for DLL SideLoading and Embed it in Lnk file to bypass MOTW
1337 Wordlists for Bug Bounty Hunting
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
Happy Birthday Animation written in Vue.js, the best for someone special
The Havoc Framework.
Collection of methodology and test case for various web vulnerabilities.
This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have created or Compiled/analysed🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
Config files for my GitHub profile.
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Tool to bypass 403/40X response codes.
My Notes about Penetration Testing