Coder Social home page Coder Social logo

ramkumar paramasivam's Projects

a-to-z-vulnerabilities icon a-to-z-vulnerabilities

This is a Kind of Dictionary which contains all kinds of Web Application and Network Security Vulnerabilities and other security concepts in an Alphabetical Order

attachment icon attachment

Attachments connect between processes that provide HTTP data and the open-appsec Agent security logic.

attackgen icon attackgen

AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details.

awsgoat icon awsgoat

AWSGoat : A Damn Vulnerable AWS Infrastructure

ceh icon ceh

Exam Prep for the Ec-council Certified Ethical Hacker 312-50

ceh2 icon ceh2

Notes for CEH v10 exam (source code)

cehv11_mindmaps icon cehv11_mindmaps

All credits to Matt Walker (Author of "CEH Certified Ethical Hacker All-in-One Exam Guide" ISBN 1264269943)

detect-secrets icon detect-secrets

An enterprise friendly way of detecting and preventing secrets in code.

devika icon devika

Devika is an Agentic AI Software Engineer that can understand high-level human instructions, break them down into steps, research relevant information, and write code to achieve the given objective. Devika aims to be a competitive open-source alternative to Devin by Cognition AI.

earlybird icon earlybird

EarlyBird is a sensitive data detection tool capable of scanning source code repositories for clear text password violations, PII, outdated cryptography methods, key files and more.

ecapture icon ecapture

capture SSL/TLS text content without CA cert using eBPF. supports Linux/Android x86_64/Aarch64.

ffuf icon ffuf

Fast web fuzzer written in Go

get_tweets icon get_tweets

Python script to download tweets for any Twitter user using Tweepy and the Twitter API

holytips icon holytips

A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.

howtohunt icon howtohunt

Collection of methodology and test case for various web vulnerabilities.

jekyll-now icon jekyll-now

Build a Jekyll blog in minutes, without touching the command line.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.