Shirshak Roy's Projects
"Computation is not the same as thought and emulation is not the same as imagination."― Abhijit Naskar
"Programmers are not to be measured by their ingenuity and their logic but by the completeness of their case analysis." ― Alan J. Perlis
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
It is a tool which automates the process of information gathering and analysis, making it easier for security professionals to identify potential vulnerabilities and weaknesses.
This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected.
Penetration Testing / OSCP Biggest Reference Bank
A Python-Bash script to check whether the given domain has clickjacking vulnerability or not.
"The universe doesn't allow perfection." ― Stephen Hawking
"To competently perform rectifying security service, two critical incident response elements are necessary: information and organization." ― Robert E. Davis
Free hands-on digital forensics labs for students and faculty
A OSINT tool to obtain a target's phone number just by having his email address
Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST
Convert Github Markdowns to PDF
This guide contains all the necessary information to get started in the area of information security, in this way, you will find courses, book recommendations, roadmaps, playlists, certifications and other things.
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Collection of methodology and test case for various web vulnerabilities.
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Interactive Tutorials
JS Analyser is a useful tool for web developers and security professionals, as it helps identify potential vulnerabilities and improve the security of web applications.
"We cannot rest and sit down lest we rust and decay. Health is maintained only through work. And as it is with all life so it is with science. We are always struggling from the relative to the absolute."― Max Planck
"If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked" ― Richard Clarke