Skip to content
View M58-ENSIBS's full-sized avatar

Block or report M58-ENSIBS

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

eBPF-based Networking, Security, and Observability

Go 20,606 3,020 Updated Jan 3, 2025

Git status for Bash and Zsh prompt

C++ 1,708 105 Updated Oct 3, 2024

The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.

Java 267 195 Updated Aug 13, 2024

A tool to embed XXE and XSS payloads in docx, odt, pptx, xlsx files (oxml_xxe on steroids)

Python 558 94 Updated Jan 28, 2024

A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.

Python 353 74 Updated Apr 18, 2024

Unsecure time-based secret exploitation and Sandwich attack implementation Resources

Python 128 12 Updated Dec 9, 2024

Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner

Python 1,724 398 Updated Apr 13, 2022

Peirates - Kubernetes Penetration Testing tool

Go 1,254 122 Updated Oct 15, 2024

The Kubernetes Package Manager

Go 27,255 7,158 Updated Jan 3, 2025

A complete computer science study plan to become a software engineer.

309,253 77,385 Updated Dec 5, 2024

A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.

1,002 159 Updated Nov 21, 2024

Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9…

C 2,318 300 Updated Apr 17, 2024

Never ever ever use pixelation as a redaction technique

TypeScript 7,843 735 Updated Mar 15, 2024

Identify privilege escalation paths within and across different clouds

Python 675 82 Updated Nov 4, 2024

proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…

C 6,904 632 Updated Jun 8, 2024

Builds a secure CI/CD pipeline on Google Cloud

HCL 102 51 Updated Dec 11, 2024

A python script to fetch various information about a user from guns.lol

Python 1 Updated Feb 6, 2024

A python script to test whether a site is vulnerable to the inclusion of LateX scripts

Python 1 Updated Oct 20, 2023

A directory containing all the challenges developed for my graduating class - ENSIBS CyberLog

HTML 1 Updated Aug 22, 2024
TypeScript 1 Updated Oct 13, 2023

A tool which allow you to crack OSPF protocol key

Python 1 Updated Jun 20, 2023
TypeScript 1 Updated Jan 24, 2023

Python script that looks for malicious imports in a project

Python 4 Updated Jun 21, 2023
Python 2 Updated Mar 27, 2023

Basic ransomware, i have probably too much free time. And this is my first exercise in Golang

Go 8 Updated Mar 15, 2022