Pinned Repositories
aws-eks-best-practices
A best practices guide for day 2 operations, including operational excellence, security, reliability, performance efficiency, and cost optimization.
CertoraTutorials
Practical tutorials of Certora Prover
CVE-2022-1388
CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE
hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Halborn-CTFs
Collection of CTFs for Fun and Interviewing Applicants
Java-Deserialization-Cheat-Sheet
The cheat sheet about Java Deserialization vulnerabilities
mimikittenz
A post-exploitation powershell tool for extracting juicy info from memory.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
recon-ng
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
grmpyninja's Repositories
grmpyninja/mimikittenz
A post-exploitation powershell tool for extracting juicy info from memory.
grmpyninja/aws-eks-best-practices
A best practices guide for day 2 operations, including operational excellence, security, reliability, performance efficiency, and cost optimization.
grmpyninja/CertoraTutorials
Practical tutorials of Certora Prover
grmpyninja/CVE-2022-1388
CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE
grmpyninja/hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
grmpyninja/Halborn-CTFs
Collection of CTFs for Fun and Interviewing Applicants
grmpyninja/Java-Deserialization-Cheat-Sheet
The cheat sheet about Java Deserialization vulnerabilities
grmpyninja/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
grmpyninja/recon-ng
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
grmpyninja/Recon-ng-modules
Additional modules for recon-ng