Skip to content
View Vulnpire's full-sized avatar
πŸ’’
../../../../../$(echo ${USER:0:2}.$(uname -n | cut -c1-4).127.0.0.1 | base64)
πŸ’’
../../../../../$(echo ${USER:0:2}.$(uname -n | cut -c1-4).127.0.0.1 | base64)

Block or report Vulnpire

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Vulnpire/README.md

Hi there!

I am Vulnpire – a passionate Red/Blue Teamer, Bounty Hunter, Software Developer, Threat Hunter, Reverse Engineer, and Tool Developer. My mission is: explore the unexplored, disrupt the norm, and secure the world, one exploit at a time.

Descriptive Text


⚑ About Me

Alias: v1xtron
πŸ›  What I do:
    Passionate about building tools for reconnaissance, exploitation, and post-exploitation
    Enjoy pentesting & bug bountiesβ€”research and articles are my Netflix
    Participate in CTFs during my free time
🧠 Currently learning: Everything
πŸ“« Contact me: ones.and.zeroes.1@pm.me
πŸ•ΆοΈ Role:
    Purple Teamer, Bounty Hunter, Software Developer, DevSecOps Engineer, Open-Source Whizz, Mentor, Trainer
β™ŸοΈ Interests & Expertise:
    Web Application Pentesting & Development
    Network & Active Directory Pentesting
    Mass Exploitation & Advanced Persistent Threat Simulation
    OSINT & Digital Forensics
    Threat Hunting & Incident Response
    Reversing & Exploit Development for Legacy and Modern Systems
    Tool-Building for Offensive Security
    Malware Development & Analysis
    Linux & DevSecOps
    Mobile App Pentesting & Development
    WiFi & IoT Pentesting

🧩 Skills & Toolbox

Vulnerability Research: RCE, XSS, SQLi, SSRF, CSRF, CORS, WEB-CACHE, SSTI, XXE, JWT, IDOR, BUSINESS LOGIC
Exploit Development: Buffer Overflows, LPEs, AD Persistence
Programming: Go, Python, Bash for Recon and Exploitation
Red Teaming: API, Web, ICS, IoT, Network Pentesting, Social Engineering, OSINT, Reconnaissance
Threat Hunting: Elastic, Sysmon, Sigma, Detection Engineering, Splunk
DevSecOps: Regex Workflows, Secure Code Audits
GoLang AWS Bash PyTorch Flask Apache Burp Suite RedHat Amazon DynamoDB MySQL Python Ruby C# JavaScript Assembly Kali Linux Wireshark Metasploit Ansible Powershell Django DigitalOcean Linode Azure GCP BSD Arch Linux Raspberry Pi Ubuntu Docker Cisco Splunk Radare2 Ghidra Frida DnSpy Chef Puppet Terraform Vagrant ArgoCD Helm Consul Prometheus Grafana Elastic Stack Harbor Spinnaker HashiCorp Vault Nginx Kubernetes Drupal Jenkins OAuth SAML

πŸš€ I'm currently working on

πŸ‘οΈ Phantom Sight: Automation for mass-scale vulnerability discovery and exploitation across the web (SaaS) - Demo Soon!
🎯 Banshee: Yet another* Google dorking tool with anti-bot bypass - Demo - Will Be Released Soon!

Exploit the unknown. Fortify the known. 🀘🏻

Pinned Loading

  1. Arsenal Arsenal Public

    Collection of tools, scripts, one-liners, templates, dorks and more

    Shell 9 3

  2. bounty-search-engine bounty-search-engine Public

    This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.

    JavaScript 12 5

  3. wayfuzz wayfuzz Public

    Generate concise and targeted wordlists from Wayback Machine URLs

    Go 5

  4. Reclaim Reclaim Public

    Identify potential subdomain takeover vulnerabilities by checking CNAME records and verifying exploitability through HTTP responses

    Go 4

  5. rHunter rHunter Public

    Open Redirect Hunter is a Burp Suite extension designed to automatically detect open redirect vulnerabilities in web applications.

    Python 3

  6. sXtract sXtract Public

    Fetch IP addresses from Shodan search results.

    Go 3