Skip to content
View rishitsaiya's full-sized avatar
😎
Building commit by commit
😎
Building commit by commit

Organizations

@oss2019

Block or report rishitsaiya

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Binaries for the book Practical Malware Analysis

1,174 340 Updated Jun 14, 2022

Open-source Windows and Office activator featuring HWID, Ohook, KMS38, and Online KMS activation methods, along with advanced troubleshooting.

Batchfile 101,214 9,869 Updated Nov 3, 2024

⭐️ Companies that don't have a broken hiring process

JavaScript 45,584 3,596 Updated Oct 25, 2024

Docker scripts for artifact evaluation

Shell 4 Updated Dec 22, 2021

Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on

PowerShell 81 5 Updated Apr 27, 2024

A unified framework for privacy-preserving data analysis and machine learning

Python 2,343 390 Updated Oct 30, 2024

A list of public penetration test reports published by several consulting firms and academic security groups.

HTML 8,472 1,942 Updated Jun 6, 2024

Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).

607 102 Updated Aug 7, 2024

I leverage OpenAI and ChatGPT to do hackerish things

Jupyter Notebook 814 193 Updated Oct 25, 2024

Projects for security students

Python 2,208 340 Updated Sep 9, 2024

The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.

Python 28,027 3,921 Updated Oct 31, 2024

Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems

Python 1,113 147 Updated Sep 10, 2023

Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness

Scala 496 95 Updated Sep 22, 2024

Codebase to generate an msdt-follina payload

Python 1,613 380 Updated Jun 8, 2022

DDoS 脚本合集

C 8 Updated Jan 1, 2022

Coursera course Number Theory and Cryptograph quiz answers

Python 9 4 Updated Mar 9, 2021

Protect and discover secrets using Gitleaks 🔑

Go 17,778 1,458 Updated Oct 31, 2024

Collection of methodology and test case for various web vulnerabilities.

6,118 1,742 Updated Aug 4, 2024

⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock

Go 6,674 578 Updated Mar 12, 2024

Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.

Go 3,973 447 Updated Oct 28, 2024

Fetch all the URLs that the Wayback Machine knows about for a domain

Go 3,527 470 Updated May 1, 2024

Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".

Python 218 56 Updated May 31, 2022

Pytorch implementation of convolutional neural network adversarial attack techniques

Python 350 61 Updated Dec 3, 2018

This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defense against all attacks using MNIST dataset.

Jupyter Notebook 120 26 Updated Dec 17, 2020

Subdover is a MultiThreaded Subdomain Takeover Vulnerability Scanner Written In Python3

Python 98 34 Updated Oct 2, 2023

Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.

OCaml 10,574 616 Updated Nov 1, 2024

Shows the IP and Geolocation of the stranger. Written in Javascript as a Extension

HTML 59 16 Updated Feb 14, 2024

Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.

Python 1,023 171 Updated Oct 31, 2024

Watch strangers talk on Omegle (man in the middle attack explained for kids)

CoffeeScript 150 31 Updated Apr 16, 2023
Next