Rahul Balamwar's Projects
This is a list of the content I shared about Web3 for the upcoming 100 days
A cheat sheet that contains advanced queries for SQL Injection of all types.
Rubber Ducky with Android
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
Checklist of the most important security countermeasures when designing, testing, and releasing your API
AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a way for further escalating the privileges.
A curated list of blogs, videos, tutorials, code, tools, scripts, and anything useful to help you learn Azure Policy - by @JesseLoudon
š”ļø Awesome Cloud Security Resources āļø
:octocat: Machine Learning for Cyber Security
A collection of awesome security hardening guides, tools and other resources
Azure Security Resources and Notes
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
Video, audio & banner adblock/skip for Spotify
A tool for parsing breached passwords
Open source education content for the researcher community
Versioned database residing in distributed storage using SQL. A command line tool and JDBC driver are provided to connect users.
My solutions to problems of Code Jam 2021.
ICS/SCADA honeypot
An easy but powerful hack of the standard copy-paste behaviour of any browser
CVE-2022-0995 exploit
win32k LPE
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
Stop Defender Service using C# via Token Impersonation
Revival of the well known .NET debugger and assembly editor, dnSpy
My solutions to Project Euler.
Fast web fuzzer written in Go
Describes a Ma.gnolia.com bookmark object, specifically for storing parsed data from API calls.