Pinned Repositories
palestras-aratu
Organização das palestras - Evento Aratu | Boitatech
pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
waf-bypass
Check your WAF before an attacker does
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
API-s-for-OSINT
List of API's for gathering information about phone numbers, addresses, domains etc
Web-CTF-Cheatsheet
Web CTF CheatSheet 🐈
Apktool
A tool for reverse engineering Android apk files
Bspwm
bspwm + polybar
Cloud-Security-Attacks
Azure and AWS Attacks
CyberPortfolio
My Portfólio
0xwhoam1's Repositories
0xwhoam1/CyberPortfolio
My Portfólio
0xwhoam1/dwmsec
DWM ST DMENU ROFI
0xwhoam1/rc
0xwhoam1/Bspwm
bspwm + polybar
0xwhoam1/i3
0xwhoam1/kubernetes-goat
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
0xwhoam1/rootAVD
Script to root AVDs running with QEMU Emulator from Android Studio
0xwhoam1/ScoutSuite
Multi-Cloud Security Auditing Tool
0xwhoam1/pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
0xwhoam1/keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
0xwhoam1/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
0xwhoam1/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
0xwhoam1/pwndoc
Pentest Report Generator
0xwhoam1/waf-bypass
Check your WAF before an attacker does
0xwhoam1/ImHex
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
0xwhoam1/Shhhloader
Syscall Shellcode Loader (Work in Progress)
0xwhoam1/Havoc
The Havoc Framework.
0xwhoam1/API-s-for-OSINT
List of API's for gathering information about phone numbers, addresses, domains etc
0xwhoam1/Formulrio-de-Cliente
Formulário de Cliente
0xwhoam1/TelaDeLogin
tela de login
0xwhoam1/Apktool
A tool for reverse engineering Android apk files
0xwhoam1/Web-CTF-Cheatsheet
Web CTF CheatSheet 🐈
0xwhoam1/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
0xwhoam1/Privilege-Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
0xwhoam1/OSCE-Complete-Guide
OSWE, OSEP, OSED
0xwhoam1/Cloud-Security-Attacks
Azure and AWS Attacks
0xwhoam1/palestras-aratu
Organização das palestras - Evento Aratu | Boitatech
0xwhoam1/my-qr.art
Design custom QR codes with this web app!
0xwhoam1/WindowsExploitationResources
Resources for Windows exploit development
0xwhoam1/OSINT-Brazuca
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.