CyberSec || Ethical Hacker || IS_Auditor π΅οΈββοΈππ₯
Hunting vulnerabilities, ethically breaking things, and questioning every "secure by design" claim..
Stars
Here I gather all the resources about hacking that I find interesting
Ansible playbook to deploy a phishing engagement in the cloud.
This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTube, and should be made available to others!
A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.
This is a blockchain protocol similar to that of bitcoin written in Golang