Skip to content
View M58-ENSIBS's full-sized avatar

Block or report M58-ENSIBS

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

eBPF-based Networking, Security, and Observability

Go 20,738 3,040 Updated Jan 21, 2025

Git status for Bash and Zsh prompt

C++ 1,711 104 Updated Oct 3, 2024

The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.

Java 268 195 Updated Aug 13, 2024

A tool to embed XXE and XSS payloads in docx, odt, pptx, xlsx files (oxml_xxe on steroids)

Python 569 94 Updated Jan 28, 2024

A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.

Python 359 74 Updated Apr 18, 2024

Unsecure time-based secret exploitation and Sandwich attack implementation Resources

Python 128 12 Updated Dec 9, 2024

Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner

Python 1,735 398 Updated Apr 13, 2022

Peirates - Kubernetes Penetration Testing tool

Go 1,262 121 Updated Jan 9, 2025

The Kubernetes Package Manager

Go 27,327 7,164 Updated Jan 20, 2025

A complete computer science study plan to become a software engineer.

310,611 77,662 Updated Dec 5, 2024

A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.

1,014 158 Updated Jan 20, 2025

Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9…

C 2,328 303 Updated Apr 17, 2024

Never ever ever use pixelation as a redaction technique

TypeScript 7,858 740 Updated Mar 15, 2024

Identify privilege escalation paths within and across different clouds

Python 676 83 Updated Nov 4, 2024

proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…

C 6,942 634 Updated Jun 8, 2024

Builds a secure CI/CD pipeline on Google Cloud

HCL 102 51 Updated Jan 9, 2025

A python script to fetch various information about a user from guns.lol

Python 1 Updated Feb 6, 2024

A python script to test whether a site is vulnerable to the inclusion of LateX scripts

Python 1 Updated Oct 20, 2023

A directory containing all the challenges developed for my graduating class - ENSIBS CyberLog

HTML 1 Updated Aug 22, 2024
TypeScript 1 Updated Oct 13, 2023

A tool which allow you to crack OSPF protocol key

Python 1 Updated Jun 20, 2023
TypeScript 1 Updated Jan 24, 2023

Python script that looks for malicious imports in a project

Python 4 Updated Jun 21, 2023
Python 2 Updated Mar 27, 2023

Basic ransomware, i have probably too much free time. And this is my first exercise in Golang

Go 8 Updated Mar 15, 2022