Skip to content
Avatar

Highlights

  • Arctic Code Vault Contributor

Popular repositories

  1. Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking your machine every time you leave for a coffee, it's about the …

    Shell 4 4

  2. Weak default credentials in combination with missing input validation allow a remote attacker to execute arbitrary code on a server using the Zmanda Management Console 3.3.9.

    HTML 4 2

  3. StealthDuckyShell is a USB rubber ducky payload for Ubuntu systems. It installs a persistent Python reverse shell & takes care of .bash_history.

    1 2

  4. A simple Python script that checks LM hashes on cracker.offensive-security.com. It's a lot faster than john. :-D

    Python 1

  5. Forked from rapid7/metasploit-framework

    Metasploit Framework

    Ruby

  6. Forked from areyou1or0/Windows

    Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more

75 contributions in the last year

Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Mon Wed Fri

Contribution activity

September 2020

4 contributions in private repositories Sep 14 – Sep 16

Seeing something unexpected? Take a look at the GitHub profile guide.

You can’t perform that action at this time.