- 📍 At the edge of privilege escalation - In the gap between "allowed" and "possible".
Pinned Loading
-
azure-red-team-abuse-scenarios
azure-red-team-abuse-scenarios PublicAttacker-focused Azure red team abuse scenarios covering identity, RBAC, lateral movement, persistence, and OPSEC.
-
linux-less-persistence
linux-less-persistence PublicDefensive audit toolkit for detecting low-artifact persistence mechanisms on Linux systems.
Python 1
-
-
Backdoor-Stealth-Image-Injection
Backdoor-Stealth-Image-Injection PublicShowcasing how uploaded images can be EXIF-injected with payloads to further compromise servers, in this specific case, by stealthily installing a backdoor.
Shell 1
-
Insider-Threat-Detection-Project
Insider-Threat-Detection-Project PublicPersonal data analysis project combining insider threat detection, cybersecurity, and exploratory data analytics. Built for portfolio showcase and practical skills demonstration.
Jupyter Notebook 1
-
Hacking-Lists
Hacking-Lists PublicForked from Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers.
If the problem persists, check the GitHub status page or contact support.