Name: Saad Bin Saleem
Type: User
Company: Consultancy, Training and Open for New Opportunities
Bio: I provide training on techniques and tools in the field of cyber security. Earlier, I have conducted research on vulnerability assessment and patch management.
Twitter: saadbinsaleem
Location: Lahore, Pakistan
Blog: https://www.linkedin.com/in/saadbinsaleem
Saad Bin Saleem's Projects
Labs for Ansible used in Dice DevOps course
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
Research on Anti-malware and other related security solutions
AntiSpy is a free but powerful anti virus and rootkits toolkit.It offers you the ability with the highest privileges that can detect,analyze and restore various kernel modifications and hooks.With its assistance,you can easily spot and neutralize malwares hidden from normal detectors.
Fast and light-weight API proxy firewall for request and response validation by OpenAPI specs.
Microsoft REST API Guidelines
This repo includes plenty of references for Azure learning, especially for the Azure certs and Azure architecture, and any other learning materials e.g. security and automation topics.
Awesome Docker Compose samples
:whale: A curated list of Docker resources and projects
A curated list of resources for learning about Google Cloud Platform certifications and how to prepare for it.
A curated list of awesome stuff for Google Cloud Platform.
š„ A curated list of awesome links related to application security related to the environments with NGINX or Kubernetes Ingres Controller (based on NGINX)
A curated list of delightful PowerShell modules and resources
A curated list of awesome threat detection and hunting resources
Bitnami CodeIgniter Docker Compose development environment
concurrent, cache-efficient, and Dockerfile-agnostic builder toolkit
Docker CLI plugin for extended build capabilities with BuildKit
A collection of materials related to my certification videos
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
A complete computer science study plan to become a software engineer.
Repository of modules and signatures contributed by the community
Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection
This is a step-by-step guide to implementing a DevSecOps program for any size organization
This is a repo for labs of devops course 8th batch
A series of Linux and Windows based Forensics labs. Tools used include: FTK, EnCase, Sleuthkit, Autopsy, Volatility, etc.