- Somewhere in world
- https://sbhuvanesh.com
- @5bhuv4n35h
Highlights
Lists (1)
Sort Name ascending (A-Z)
Stars
Penetration tests guide based on OWASP including test cases, resources and examples.
Collection of extracted System Prompts from popular chatbots like ChatGPT, Claude & Gemini
Lightweight tool to automate downloading and metadata generation with yt-dlp
A curated list of cybersecurity tools and resources.
Rid_enum is a null session RID cycle attack for brute forcing domain controllers.
Exchange your privileges for Domain Admin privs by abusing Exchange
This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.
This repository contains a collection of important notes and commands for the Certified Ethical Hacker (CEH) practical exam. Aspiring CEH professionals will find these resources invaluable in their…
A list of application tools and information resources to help you effectively use regular expressions in OSINT (Open Source Intelligence)
Collection of Pentest Notes and Cheatsheets
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
⭐️ A curated list of awesome forensic analysis tools and resources
This toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices.
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Repository to house markdown templates for researchers
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
An OSINT Geolocalization tool for Telegram that find nearby users and groups 📡🌍🔍
This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
List of Computer Science courses with video lectures.
Machine learning face recognition combined with a drone and osint tools
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!