Skip to content
View Sh3lldon's full-sized avatar
💢
Focusing
💢
Focusing
Block or Report

Block or report Sh3lldon

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Sh3lldon/README.md

Hi there 👋

My name is Magzhan (Shelldon) Tursynkul, I am Windows Kernel/Driver/User Mode Exploit Developer, Reverse Engineer and Red Teamer.

  • OSED Certified | OSEP in proccess

  • HTB Prolabs: Dante & Zephyr & Offshore

Pinned

  1. RemoteApp RemoteApp Public

    I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel free to DM me in discord, if you have any questions about so…

    C 40 7

  2. Vulnerable-WinKern-Drivers Vulnerable-WinKern-Drivers Public

    Here you can find some vulnerable Windows Kernel Drivers

    10 1

  3. EXP-301-cheat-sheets EXP-301-cheat-sheets Public

    Some good things for EXP-301 course

    8

  4. WinPWN WinPWN Public

    This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits

    17 1

  5. FullBypass FullBypass Public

    A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell. Feel free to DM if you find some bugs :)

    C# 535 97