Skip to content

Instantly share code, notes, and snippets.

View security-prince's full-sized avatar

Ishaq Mohammed security-prince

View GitHub Profile
baseurl = ""
title = "AppSec Enthusiast"
theme = "hugo-coder"
languagecode = "en"
defaultcontentlanguage = "en"
paginate = 20
canonifyurls = true
pygmentsstyle = "bw"
security-prince / pre-commit
Created July 10, 2018 20:38 — forked from kaushikgopal/pre-commit
pre-commit git hook - no "hacking"
#!/usr/bin/env ruby
# This pre-commit hook will prevent any commit to forbidden branches
# (by default, "staging" and "production").
# Put this file in your local repo, in the .git/hooks folder
# and make sure it is executable.
# The name of the file *must* be "pre-commit" for Git to pick it up.
def current_branch()
branches = `git branch --no-color`.split(/\n/)
security-prince /
Created July 10, 2018 13:40 — forked from noelboss/
Simple automated GIT Deployment using Hooks

Simple automated GIT Deployment using GIT Hooks

Here are the simple steps needed to create a deployment from your lokal GIT repository to a server based on this in-depth tutorial.

How it works

You are developing in a working-copy on your local machine, lets say on the master branch. Most of the time, people would push code to a remote server like or and pull or export it to a production server. Or you use a service like my to act upon a Web-Hook that's triggered that service.

security-prince /
Created July 9, 2018 04:51 — forked from hofmannsven/
My simply Git Cheatsheet

How to pass the OSCP

  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it


Unicornscans in cli, nmap in msfconsole to help store loot in database.