Ishaq Mohammed's Projects
Roadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome
CTF framework and exploit development library
PwnWiki - The notes section of the pentesters mind.
All Algorithms implemented in Python
Python tools for penetration testers
A Pythonic framework for threat modeling
A quick reminder of all SQL queries and examples on how to use them.
Tool to help with the exploitation of web application race conditions
Race Condition Vulnerable Web Application
Tests for race conditions in web applications.
Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!
"Reverse Engineering for Beginners" free book
List of some useful blogs, books, courses, papers etc.
:books: Stuff to read up
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results along with writing out recommendations for further testing.
A collection of open source and commercial tools that aid in red team operations.
Issues to consider when planning a red team exercise.
Red Team Tips as posted by @vysecurity on Twitter
CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys
Scan your code for security misconfiguration, search for passwords and secrets. :mag:
Hello and welcome to my GitHub account. If you'd like to know more about me, this is likely the best place to start
A repo for various research
Resources for different topics
Some good resources for getting started with application security
All the resources I could find for learning Ethical Hacking and penetration testing.
GitBook: OSCP RoadMap
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
Rubyfu, where Ruby goes evil!
A framework for BREACH and other compression-based crypto attacks
A CUI Struts2 Vulnerability Exploit