-
University of Southern California (USC)
- https://rishitsaiya.github.io
Highlights
Starred repositories
Binaries for the book Practical Malware Analysis
Open-source Windows and Office activator featuring HWID, Ohook, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
⭐️ Companies that don't have a broken hiring process
Docker scripts for artifact evaluation
Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on
A unified framework for privacy-preserving data analysis and machine learning
A list of public penetration test reports published by several consulting firms and academic security groups.
Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).
I leverage OpenAI and ChatGPT to do hackerish things
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness
Codebase to generate an msdt-follina payload
Coursera course Number Theory and Cryptograph quiz answers
Protect and discover secrets using Gitleaks 🔑
Collection of methodology and test case for various web vulnerabilities.
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
Fetch all the URLs that the Wayback Machine knows about for a domain
Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".
Pytorch implementation of convolutional neural network adversarial attack techniques
This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defense against all attacks using MNIST dataset.
Subdover is a MultiThreaded Subdomain Takeover Vulnerability Scanner Written In Python3
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
Shows the IP and Geolocation of the stranger. Written in Javascript as a Extension
Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.
Watch strangers talk on Omegle (man in the middle attack explained for kids)