Rishabh Soni
rishb0
Aspiring Cybersecurity Professional | Ethical Hacking & Networking Enthusiast
Languages
Repos
16
Stars
1
Forks
0
Top Language
Java
Loading contributions...
Top Repositories
List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.
Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
Offensive Nmap guide for penetration testers and red teamers. Includes practical examples, evasion techniques, and advanced usage for network reconnaissance and stealth scanning.
Repositories
16List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.
No description provided.
No description provided.
Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
Offensive Nmap guide for penetration testers and red teamers. Includes practical examples, evasion techniques, and advanced usage for network reconnaissance and stealth scanning.
Rison Copy Checker is a Python-based automatic exam notebook checker with a GUI. It uses artificial intelligence to evaluate student answer sheets and generate a report.
21 Lessons, Get Started Building with Generative AI
No description provided.
No description provided.
Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Security and API Security. This repository helps enthusiasts prepare for interviews by providing a comprehensive list of questions, answers, and insights into security concepts and practices.
A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as a quick reference cheat sheet for your pentesting and bug bounty engagement.
Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target system or network.
No description provided.
Covering fundamental Linux concepts, from basic commands to advanced topics like string processing, file management, user and group management, networking, process control, firewall configuration, task scheduling, and more.
Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethical hackers and security engineers.
A deliberately vulnerable banking application designed for practicing secure code reviews and API security testing. Features common vulnerabilities found in real-world applications, making it an ideal platform for security professionals, developers, and enthusiasts to learn security testing and secure coding practices in a safe environment.