Skip to content
View D3anSPGDMS's full-sized avatar
💭
I may be slow to respond.
💭
I may be slow to respond.

Block or report D3anSPGDMS

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
D3anSPGDMS/README.md
  • 👋 Hi, I’m @D3an
  • 👀 I’m interested in Cyber Security and Software Developer from Lemont.
  • 🌱 I’m currently learning vulnerability analysis.
  • 💞️ I’m looking for friends to study with.
  • 📫 Contact me: [email protected]
  • ⚡ Fun fact: Web, Reverse Engineering, Pwn.

Popular repositories Loading

  1. CVE-2024-4879 CVE-2024-4879 Public

    Forked from gh-ost00/CVE-2024-4879

    Jelly Template Injection Vulnerability in ServiceNow | POC CVE-2024-4879

    Python

  2. CVE-2024-22024 CVE-2024-22024 Public

    Forked from 0dteam/CVE-2024-22024

    Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure

    Python

  3. CVE-2024-38063 CVE-2024-38063 Public

    Forked from ynwarcs/CVE-2024-38063

    poc for CVE-2024-38063 (RCE in tcpip.sys)

    Python

  4. CVE-2024-7954 CVE-2024-7954 Public

    Forked from Chocapikk/CVE-2024-7954

    Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12

    Python

  5. D3anSPGDMS D3anSPGDMS Public

    Config files for my GitHub profile.

  6. CVE-2024-8190 CVE-2024-8190 Public

    Forked from horizon3ai/CVE-2024-8190

    CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection

    Python