
-
University of Southern California (USC)
- https://rishitsaiya.github.io
Highlights
Starred repositories
API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).
Windows 11 and Windows 10 Activator
🔍 Search anyone's digital footprint across 300+ websites
Binaries for the book Practical Malware Analysis
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
⭐️ Companies that don't have a broken hiring process
Docker scripts for artifact evaluation
Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on
A unified framework for privacy-preserving data analysis and machine learning
A list of public penetration test reports published by several consulting firms and academic security groups.
Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).
I leverage OpenAI and ChatGPT to do hackerish things
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness
Codebase to generate an msdt-follina payload
Coursera course Number Theory and Cryptograph quiz answers
Collection of methodology and test case for various web vulnerabilities.
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
Fetch all the URLs that the Wayback Machine knows about for a domain
Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".
Pytorch implementation of convolutional neural network adversarial attack techniques
This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defense against all attacks using MNIST dataset.
Subdover is a MultiThreaded Subdomain Takeover Vulnerability Scanner Written In Python3