Apoorv Gupta
Agisthemantobeat
Senior Software Engineer/Developer/Security Test Engineer/Network Security Associate(NSE1,NSE2)/White Hat
Languages
Repos
86
Stars
30
Forks
5
Top Language
Python
Loading contributions...
Top Repositories
This is a repository containing code to generate a PowerShell payload to access PCs remotely. For more information check this out 👇👇👇
Behavioral biometrics is a cutting-edge field that focuses on analyzing user behavior to enhance security and authentication processes. This repository serves as a hub for everything related to this innovative technology. Read more at 👇👇👇
Traditional methods of threat detection are often insufficient, necessitating the integration of cutting-edge technologies. This code demonstrates how OpenAI's GPT(Generative Pre-trained Transformers) can be utilized for basic level threat detection and entity recognition, enhancing cybersecurity measures. 😎😎 Read full Blog at 👇👇👇
A measure to predict the value of shares of a particular company in coming days for better investrment.
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
A pure Django based Login and Signup Page.
Repositories
86Behavioral biometrics is a cutting-edge field that focuses on analyzing user behavior to enhance security and authentication processes. This repository serves as a hub for everything related to this innovative technology. Read more at 👇👇👇
:notebook: Reference guide for scanning networks with Nmap.
A measure to predict the value of shares of a particular company in coming days for better investrment.
This is a repository containing code to generate a PowerShell payload to access PCs remotely. For more information check this out 👇👇👇
Traditional methods of threat detection are often insufficient, necessitating the integration of cutting-edge technologies. This code demonstrates how OpenAI's GPT(Generative Pre-trained Transformers) can be utilized for basic level threat detection and entity recognition, enhancing cybersecurity measures. 😎😎 Read full Blog at 👇👇👇
Microsoft Azure Fundamentals - AZ-900T00 and AZ-900T01
No description provided.
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Damn Vulnerable Thick Client App
A pure Django based Login and Signup Page.
This is a website analyzer which accepts excel file containing urls and updates the status with status codes in it .
PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
No description provided.
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
🎯 Open Redirect Payload List
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication
A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
No description provided.
A small game in C Language to play Tic Tac Toe between two players
This is the updated version of blackeye with ngrok
No description provided.
Infect Any Android Device With Virus From Link In Termux
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
This is a list of substantial, commercial-or-social-good mainstream websites which provide onion services.
A collection of awesome penetration testing resources, tools and other shiny things
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.