Skip to content
View Sincan2's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report Sincan2

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Sincan2/README.md

Typing SVG

β”Œβ”€β”€(sincan2γ‰Ώgithub)-[~/exploit]
└─$ whoami
Sincan2

β”Œβ”€β”€(sincan2γ‰Ώgithub)-[~/exploit]
└─$ ./poc_cve_2024_6387
[+] Heap grooming...
[+] Triggering race condition...
[+] Reverse shell: 127.0.0.1:4444

🧠 Tentang Saya

  • πŸ› οΈ "Di atas langit masih ada langit"
  • πŸ’£ Fokus: Reverse Engineering, Kernel Exploit, CVE Hunting
  • πŸ§ͺ email: sincan2@gmail.com

πŸ“Š Stats & Tools


πŸ§‘β€πŸ’» Kunjungi Juga:

Visitor Count

Pinned Loading

  1. regreSSHion regreSSHion Public

    regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server

    Python 2

  2. casdoor-scanner casdoor-scanner Public

    Exploit Casdoor Scanner

    Python 1

  3. mhl mhl Public

    Verify and EXploitation Tool (MOD v3.0) @refactor: Sincan2 (2025)

    Python 1

  4. fortinet fortinet Public

    Python 1

  5. local-root-kernel6 local-root-kernel6 Public

    Local Root Exploit New Kernel 6.xx 5.xx 4.xxx

    C 1

  6. RCE-CVE-2025-32710 RCE-CVE-2025-32710 Public

    Windows Remote Desktop Services Vulnerability Allows Remote Code Execution

    Shell 2 1