The Goal - World Domination
[Interviewer]
Yeah, yeah, that's cool
So what's like, I mean what's like
Your ultimate goal against in this in this industry?
[Method Man]
Domination, baby, fuck that
Table of Contents
Why Sponsor
Ever since embarking on my hacking journey beginning with the OSCP. I have learned to be as effective as possible you must consume quality educational material. This is crucial, mission critical and absolutely necessary.
As I get older my goal is to provide information to the next generation of hackers that have a strong desire to dive into binary exploitation and true computer operations that can only be understood at the lowest level.
That said I want to bring you information that is easily digestible and worthy of your time. In return for sponsorship you will get:
- Early access to any publications I will release on https://wetw0rk.github.io/
- Early access to prep guides tailored to different courses (e.g AWAE-PREP)
- Access to projects not yet open sourced (if ever)
Where will your money go?
- Infrastructure
- Hardware
- Tooling
Completed Projects
- AWAE-PREP
- A guide containing subject matter I completed that allowed me to pass the OSWE certification. Unlike most guides I won't be throwing a bunch of links at you. EVERYTHING within this guide directly contributed to my success within the WEB-300 course.
- MBE NOTES
- A organized collection notes taken during my completion of the Modern Binary Exploitation course. This was released with permission of the original authors. That's right! A 300+ page guide that walks you through different attack techniques against the x86 architecture such as bypassing DEP and ASLR along with Heap and Kernel Exploitation. As an aside I heavily recommend their WarGames course which covers the x64 architecture and additional techniques not covered in MBE. Having spoken with the authors and being allowed to release the aforementioned PDF speaks volumes as to selecting them for future trainings. I will personally be taking their course as they release. You can find my review to WarGames on my Linkedin.
- CA Unified Infrastructure Management Research
- This was 0day research I conducted on the Nimsoft protocol. This repository contains all code created during the discovery of 3 0days. Two of which resulted in remote code execution. Within this repository you will find: a custom client created from reverse engineering the protocol, exploit code in C, an early release of a Metasploit module, and the fuzzer developed to find the 0days.
Ongoing Projects
- Sickle
- A payload development framework designed for modern environments. Long gone are the days of using malware and shellcode out of the box. With the ever changing landscape attackers are now creating custom tooling. Sickle aims to allow YOU the user the ability to evolve with attackers and leverage a framework to make custom payload development easier.
- NDA NOT TODAY
- This is a play on words, but I have ongoing projects that I plan to release however until complete I prefer not to speak! However, as a sponsor you will get exclusive access to these projects before released publicly - if ever.
Sponsor Perks
Sponsors will get access to source code not public and guides if applicable (e.g AWAE-PREP.pdf / Ezekiels Wheel). It's important note I will not assist in sharing existing course material out of moral code and respect for authors. As for code... what you do with it is not my responsibility and I often use the MIT License if you are concerned on code-reuse. However I do not condone or engage in illegal activity whatsoever.
Anything else, contact me!
2 sponsors have funded wetw0rk’s work.
Featured work
-
wetw0rk/AWAE-PREP
This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with the AWAE course. This repo will likely contain custom code by…
Java 896 -
wetw0rk/Sickle
Payload Development Framework
Python 757 -
wetw0rk/Exploit-Development
CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002
C 67 -
wetw0rk/CA-UIM-Nimbus-Research
Vulnerability research on the CA UIM Nimbus protocol
Python 15
0% towards 1 monthly sponsor goal
Be the first to sponsor this goal!
$5 a month
Select- Get a Sponsor badge on your profile
$100 a month
Select- Logo or name goes onto all project README's (while sponsorship is held)
- Logo or name goes onto all blog posts (while sponsorship is held)
- Early access to blog posts before posted on https://wetw0rk.github.io/
- Early access to prep guides tailored to different courses, with lifetime access after $500 (e.g AWAE-PREP)
- Access to projects not yet open sourced, with lifetime access after $500 (if ever)
$1,000 a month
Select- Directly influence prioritization in tooling such as Sickle.
- Directly influence research for a particular platform or architecture.
- Logo or name goes onto all project README's (while sponsorship is held)
- Logo or name goes onto all blog posts (while sponsorship is held)
- Early access to blog posts before posted on https://wetw0rk.github.io/
- Early access to prep guides tailored to different courses (e.g AWAE-PREP)
- Access to projects not yet open sourced (if ever)