- Pune, India
-
17:35
(UTC -12:00) - @yogesh_she1ke
Starred repositories
Dime is a beautiful expense tracker built with iOS design guidelines in mind.
Generate Email, Register for anything, Get the OTP/Link
An step by step fuzzing tutorial. A GitHub Security Lab initiative
A PowerShell module to deploy active directory decoy objects.
Compilation of Resources from TCM's Windows Priv Esc Udemy Course
ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Custom Query list for the Bloodhound GUI based off my cheatsheet
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
ScanT3r - Module based Bug Bounty Automation Tool ( use Lotus instead github.com/bugBlocker/lotus )
Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the Python Fl…
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
A curated list of free courses with certifications. Also available at https://free-certifications.com/
Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on hackingarticles.
Privilege Escalation Enumeration Script for Windows
This repo contains all the Bug Bounty Dorks sourced from different awesome sources and compiled at one place
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
Tools, tips, tricks, and more for exploring ICS Security.
A curated list of resources related to Industrial Control System (ICS) security.
A collection of materials related to my certification videos
SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with …