Roman Zaikin (@romanzaikin)

Top repositories

1

BurpExtension-WhatsApp-Decryption-CheckPoint

This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)
Python
631
star
2

OllyDbg-v1.10-With-Best-Plugins-And-Immunity-Debugger-theme-

Make OllyDbg v1.10 Look like Immunity Debugger & Best Plugins
Batchfile
100
star
3

Owasp-TOP-10-Training-Panel

This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Penetration Testing.
PHP
48
star
4

From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-Workshop

From Zero to Hero in Web Security Research - Def Con 29 Workshop
EJS
36
star
5

From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop

Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a new cyberattack in a new crypto world. While technology evolves cybercriminals evolve along and we constantly hear about the theft of millions of dollars at security breaches in smart contracts everywhere.
Solidity
28
star
6

Google_Maps_Snake_Hack

A research done by Yaara Shriki and Roman Zaikin on Google maps April Fool Prank.
HTML
16
star
7

ITsafe_Mobile_Penetration

Training Apps For Mobile Penetration Book
Java
13
star
8

RaspberryPiVM

This repository contains a raspberry pi VM that can be executed by using Qemu
Shell
11
star
9

GmailTracker

Simple Chrome Extension to Add Check Marks in Gmail ✓✓
JavaScript
10
star
10

Owasp-TOP-10-Training-Panel-Node

This repository contains the source code of the OWASP TOP 10 NodeJS Panel I have used
EJS
10
star
11

smartDiff

smart function that will highlight the difference between 2 strings
Python
5
star
12

PEImage

Store and Retrieve PE inside Image using pixel colors as bits
Python
4
star
13

owasp-il-ctf

solutions to OWASP IL CTF
Python
3
star
14

minesweeper_debugger_loop

solving the game minesweeper by using debugger loop in C and Python
C
2
star
15

defcon_a3_sensitive_data_exposure

Rather than directly attacking crypto, attackers steal keys, or steal clear text data off the server, Developers sometimes forget test cases or other files on production servers.
CSS
2
star