Bibek Subedi's Projects
This is just fun part
Projects for security students
š Join us for 30days of daily API security tests. #30days30tests We've spent last 120days building amazing API security tests for the community. Next 30 days we will post test tutorials here.
this is made to be worked on the projects of hacktoberfest2023
Short JavaScript code snippets for all your development needs
I'll be starting a 30 days of code mainly focused on the backend part. I'll make sure that I will code at least 1 hour a day and consistently updating my progress.
Top 30 Amazing Flutter Tips with Lakshydeep Vikram
š 33 JavaScript concepts every developer should know.
403/401 Bypass Methods + Bash Automation + Your Support ;)
Automated XSS Vulnerability Finder
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Scripts and piece of codes used for Active Directory configuration
List of the links to the docs for different services, which explain using of advanced search operators
A cheat sheet that contains advanced queries for SQL Injection of all types.
AFF is an open and extensible file format to store disk images and associated metadata.
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
Afuzz is an automated web path fuzzing tool for the Bug Bounty projects.
Those courses for not Technical and Technical backgroud of Computer Science Field.
All about bug bounty (bypasses, payloads, and etc)
All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.
Android Pentesting & CTF
androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces of compromise.
Redirect All Traffic Through Tor Network
Training Deep Neural Networks via Direct Loss Minimization