10000 sarah-lishin (fiolet) / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View sarah-lishin's full-sized avatar
💜
#secureallthethings
💜
#secureallthethings
  • Fluxx Labs
  • New York, NY

Block or report sarah-lishin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

ClusterFuzzLite - Simple continuous fuzzing that runs in CI.

492 44 Updated Dec 3, 2024

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

XSLT 7,716 1,066 Updated Jun 28, 2025

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 11,810 1,421 Updated Oct 28, 2024

Super timeline all the things

Python 9C6D 1,872 374 Updated Jun 2, 2025

The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the pro…

258 31 Updated Feb 2, 2021

Command-line utility for multipattern search using liblightgrep

C++ 58 11 Updated Jun 11, 2025

2021 SANS DFIR Summit: Greppin' Logs

Python 20 2 Updated Jul 22, 2021
Python 42 9 Updated Dec 13, 2020

CloudMapper helps you analyze your Amazon Web Services (AWS) environments.

JavaScript 6,173 829 Updated Jul 15, 2024

Red Teaming & Pentesting checklists for various engagements

2,569 517 Updated Aug 21, 2024

windows-kernel-exploits Windows平台提权漏洞集合

C 8,368 2,853 Updated Jun 11, 2021

Collection of different exploits

Python 182 47 Updated Nov 17, 2020

⛔ offsec batteries included

Python 1,565 600 Updated Mar 11, 2024

Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.

C 812 317 Updated Apr 11, 2023

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileg…

Shell 2,337 259 Updated Jun 5, 2025

Telling tales on you for leaking secrets!

Go 233 13 Updated Jun 9, 2025
0