Skip to content
View emr4h's full-sized avatar
🏠
Working from home
🏠
Working from home
Block or Report

Block or report emr4h

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Collection of methodology and test case for various web vulnerabilities.

6,006 1,714 Updated Aug 4, 2024

DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration | Compromised Account Checking

Python 616 139 Updated Sep 24, 2022

Labs for Practical Malware Analysis & Triage

HCL 820 189 Updated Apr 19, 2024

A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

Jinja 2,052 345 Updated Aug 13, 2024

Encodes a PowerShell script in the pixels of a PNG file and generates a oneliner to execute

PowerShell 2,154 401 Updated Sep 23, 2019

This script is developed to detect accounts that username and password are same.

PowerShell 1 Updated Mar 24, 2023

Fuzzy hashing API and fuzzy hashing tool

C 654 112 Updated Mar 16, 2021

A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.

PowerShell 6,278 889 Updated Aug 13, 2024

Volatility plugin for extracts configuration data of known malware

Python 477 69 Updated Dec 22, 2023

Tips and Tutorials for Bug Bounty and also Penetration Tests.

1,369 335 Updated Feb 12, 2024

Network & Security IPv4-IPv6-ACL

8 Updated Nov 18, 2022

Source Code Review resources for Bug Bounty Hunters & Developers. This Repo is updated consistently.

50 18 Updated Dec 30, 2021

Ressources for bug bounty hunting

1,688 549 Updated Dec 1, 2022

Flutter için Türkçe ve İngilizce kaynakların toplandığı rehber

976 114 Updated Jul 2, 2022

BugBounty_CheatSheet

242 55 Updated May 11, 2023

Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature

3,678 982 Updated Jul 31, 2024

Sysmon configuration file template with default high-quality event tracing

4,704 1,685 Updated Jul 3, 2024

Repository resource for threat hunter

157 32 Updated Sep 14, 2018

The program that makes the Diamond Pattern. Made with C language. This program was written for the Algorithms and Programming lecture.

C 3 Updated Aug 15, 2021

Minesweeper clone. Made with C#. This program was written for the Algorithms and Programming lecture.

C# 3 Updated Aug 15, 2021

Program that performs Polybius Encryption. Made with C#. This program was written for the Algorithms and programming lecture.

C# 3 Updated Aug 15, 2021

Library Automation made with C# and Access Database

C# 2 1 Updated Aug 15, 2021

Program to Calculate Text Similarity ratio using Tversky Index, Sørensen–Dice coefficient and Jaccard Index. Made with C#. This program was written for the Algorithms and Programming lecture.

C# 2 Updated Aug 15, 2021

BattleShip Game made with C. This program was written for the Algorithms and Programming lecture.

C 3 Updated Aug 15, 2021

Matris Number Puzzle Game made with C#. This program was written for the Algorithms and Programming lecture.

C# 3 Updated Aug 15, 2021

The E-Commerce Application that made with Xamarin and MVVM Pattern using Firebase authentication, Firebase realtime database and Sqlite. This program was written for the Object Oriented Programming…

C# 4 1 Updated Aug 15, 2021

The program making comparison between doubly linked lists created by values ​​read from text file. Made with C. This program was written for the Data Structures lecture.

C 2 Updated Aug 15, 2021
Next