captainsalazar's Projects
List of Awesome Advanced Windows Exploitation References
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
Defund the Police.
A curated list of awesome YARA rules, tools, and people.
CTF challenge with Blind Curl or Ping
Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Multiple levels of Pivoting and exposing multiple internal services to external/other networks
(WIP) Blockchain smart contracts with "CosmWasm" (academy.cosmwasm.com)
CTF for Women Tech House by Synet Pakistan
This is a Data Vistualization project from the data taken from a CSV containing a massive information about the accidents happened in NewYork. This is a web application which is completely developed on Python code using SteamLit library. Though the other libraries are also required to include in it as numpy, pandas, etc.
Empire is a PowerShell and Python 3.x post-exploitation framework.
Offensive Software Exploitation Course
Go scripts for finding sensitive data like API key / some keywords in the github repository
A permutation generation tool written in golang
The code in the game above is very simple and non-structural. You are welcome to contribute in the code and update it in the form of classes and proper structure. Your efforts shall really be appreciated. This is for the beginners so that they could see the working code in unstructured form and then give it Object Oriented shape by updating the code. I have made logic very simple and straight forward. Just start reading the code from the bottom life as the main function, also mentioned in comment, and see what values are passing to functions and which function. This will surely help you to understand the pattern and flow of code. If you still have problem in understanding the code, you can share it in "Issues" tab or contact me on "[email protected]" or my Twitter, Insta, LinkedIn, Facebook as @syedalizain033. Thank you.
ALL IN ONE Hacking Tool For Hackers
repo for hacktoberfest22
This is a JS files scanner using the Regex so if it finds any JS code with the API key leak by matching it with the regex.
Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.
Full reference of LinkedIn answers 2022 for skill assessments (aws-lambda, rest-api, javascript, react, git, html, jquery, mongodb, java, Go, python, machine-learning, power-point) linkedin excel test lösungen, linkedin machine learning test LinkedIn test questions and answers
A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.
Mastering Machine Learning for Penetration Testing, published by Packt
A platform build in django for hosting CTF events.