Skip to content
View sandesh381's full-sized avatar

Block or report sandesh381

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. reverse-shell-able-exploit-pocs reverse-shell-able-exploit-pocs Public

    Forked from rayhan0x01/reverse-shell-able-exploit-pocs

    Reverse Shell-able Windows exploits short POCs.

    Python 1

  2. nishang nishang Public

    Forked from samratashok/nishang

    Nishang - Offensive PowerShell for red team, penetration testing and offensive security.

    PowerShell 1

  3. PayloadsAllTheThings PayloadsAllTheThings Public

    Forked from swisskyrepo/PayloadsAllTheThings

    A list of useful payloads and bypass for Web Application Security and Pentest/CTF

    Python

  4. Checklists Checklists Public

    Forked from netbiosX/Checklists

    Red Teaming & Pentesting checklists for various engagements

  5. juice-shop juice-shop Public

    Forked from juice-shop/juice-shop

    OWASP Juice Shop: Probably the most modern and sophisticated insecure web application

    JavaScript

  6. OSCP-Exam-Report-Template-Markdown OSCP-Exam-Report-Template-Markdown Public

    Forked from noraj/OSCP-Exam-Report-Template-Markdown

    📙 Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report

    Ruby