[go: nahoru, domu]

Skip to content
View alien-keric's full-sized avatar
  • cloudstechn.com
  • anonymous
Block or Report

Block or report alien-keric

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Beta Lists are currently in beta. Share feedback and report bugs.

Starred repositories

Showing results

💻 🍚 🔳 🔲 My riced-up Kali dotfiles – off-white | dark leet | chrome lambo

Shell 87 9 Updated May 2, 2022

Dotfiles for solarized theme Kali

Shell 24 2 Updated Sep 19, 2019

ysoserial.net docker image

Shell 26 6 Updated Feb 9, 2024

Python3 script to quickly get various information from a domain controller through his LDAP service.

Python 145 32 Updated Mar 25, 2024

A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for e…

Nim 63 20 Updated Jan 23, 2024

my kali desktop setup

Shell 247 79 Updated Jun 13, 2024

WebSocket cat

JavaScript 2,112 214 Updated May 19, 2024

Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9…

C 2,157 283 Updated Apr 17, 2024

Microsoft-Outlook-Remote-Code-Execution-Vulnerability

Python 642 142 Updated Feb 19, 2024

A minimal Hugo Theme

HTML 922 287 Updated Apr 20, 2024

An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

Go 2,348 243 Updated Jun 24, 2024

Collection of Cyber Threat Intelligence sources from the deep and dark web

4,041 728 Updated Jun 29, 2024

We have made you a wrapper you can't refuse

Python 25,309 5,137 Updated Jun 29, 2024

This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.

3,190 601 Updated Feb 11, 2023

An LDAP based Active Directory user and group enumeration tool

Python 302 68 Updated Feb 10, 2023

Openfire Console Authentication Bypass Vulnerability with RCE plugin

Python 1 Updated Mar 7, 2024

Openfire Console Authentication Bypass Vulnerability with RCE plugin

Python 33 8 Updated Mar 7, 2024

Impacket is a collection of Python classes for working with network protocols.

Python 12,952 3,482 Updated Jun 26, 2024

A PoC exploit for CVE-2023-32315 - Openfire Authentication Bypass

Python 3 2 Updated May 17, 2024

Minecraft-client networking library in Python

Python 802 185 Updated Feb 4, 2024

A list of interesting payloads, tips and tricks for bug bounty hunters.

5,635 1,516 Updated Sep 14, 2023

Open Cyber Threat Intelligence Platform

JavaScript 5,124 813 Updated Jun 28, 2024

A multi-purposed password management tool

Python 9 1 Updated May 18, 2023

A curation of awesome security tools, exploits security projects developed by Tanzanian Cybersecurity Enthusiasts

CSS 1 Updated Apr 14, 2024

How to exploit SeImpersonatePrivilege with different ways

4 2 Updated Apr 20, 2024

Windows Privilege Escalation

2 2 Updated Jun 7, 2022

series of sherlock walkthrough

1 Updated Apr 23, 2024

some addition script that were usufull while solving napper and hard to get them

Go 1 Updated Apr 12, 2024

Extract phone numbers from an audio recording of the dial tones.

Python 275 45 Updated May 17, 2024

simple google map written in java

Java 1 Updated Apr 12, 2024
Next