Sajan Kumar.S's Projects
Setting up MySQL InnoDB Cluster with MySQL Shell (plus MySQL Router) using just Docker containers.
Network Automation and Programmability Abstraction Layer with Multivendor support
neper is a Linux networking performance tool.
Real-time metrics for nginx server
Say "ni" to data of any size
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Library (and console app) to analyse and predict financial data from National Stock Exchange (NSE - India) in pandas dataframe
office-exploits Office漏洞集合 https://www.sec-wiki.com
YARA Rules I come across on the internet
Open Cyber Threat Intelligence Platform
Setting up Orchestrator and MySQL Replication (M ⭢ S1 / M ⭢ S2) using Docker.
Orchestrator/Raft (with MySQL backend) on a 3 node setup using Docker containers.
This repository was created and developed by Ammar Amer @cry__pto Only. Updates to this repository will continue to arrive until the number of TIPS reach 1000 TIPS .Learn Ethical Hacking and penetration testing.and of course OSINT
PowerShell Runspace Post Exploitation Toolkit
A toolset for building system packages using Docker and fpm-cookery
Scalable Data Policy Management and Enforcement
Passive service locator, a python sniffer that identifies servers, clients, names and much more
A template for PostgreSQL High Availability with Etcd, Consul, ZooKeeper, or Kubernetes
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
CLI tool to analyze PE files
Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
PowerShell module to check if a Windows binary (EXE/DLL) has been compiled with ASLR, DEP, SafeSEH, StrongNaming, and Authenticode.
PostgreSQL® backup and restore service
A battle-tested, flexible & comprehensive monitoring solution for your PostgreSQL databases
Windows active user credential phishing tool
Parse YARA rules and operate over them more easily.
Collaborative malware analysis framework
Postgres operator creates and manages PostgreSQL clusters running in Kubernetes
A collection of data exfiltration scripts for Red Team assessments.
Exploit the credentials present in files and memory