Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
@verylazytech
verylazytech
Follow
View verylazytech's full-sized avatar

Very Lazy Tech verylazytech

🛋️ Welcome to Very Lazy Tech! 🖥️ Hey, I'm your tech guide focused on simplicity. Join me as we navigate the world of tech with ease.

Block or report verylazytech

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more aboutblocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more aboutreporting abuse.

Report abuse
verylazytech/README.md

VeryLazyTech

💻 Welcome to Simplified Cybersecurity! 🛡️

Hey, I'm Very Lazy Tech, your laid-back guide to mastering ethical hacking and red teaming without the hassle. Let's explore cybersecurity the smart, simple way.

👨‍💻 About Me

I'm passionate about helping aspiring ethical hackers and red teamers sharpen their skills without feeling overwhelmed. Whether you're a beginner exploring cybersecurity or a pro looking for streamlined techniques, I've got your back.

🔍 What to Expect

  • Easy-to-follow guides on penetration testing and red team strategies.
  • Tools, scripts, and resources for ethical hackers made simple.
  • Real-world examples of exploiting vulnerabilities and patching them.
  • Step-by-step breakdowns of hacking techniques (the ethical way, of course).
  • Tips on automating tasks to save time during engagements.

⚔️ Red Team Mindset

Think like a hacker, act like a pro. Learn to identify weaknesses and protect systems the ethical way.

🛋️ Keep it ChillHacking doesn’t have to feel daunting. Sit back, relax, and let’s simplify red teaming and ethical hacking together.

My ShopMediumGithubMy GitBookXProfile view counter on GitHub

PinnedLoading

  1. OSCP-ResourcesOSCP-ResourcesPublic

    A comprehensive collection of resources, tools, tips, and guides for preparing and succeeding in the OSCP (Offensive Security Certified Professional) certification.

    359 87

  2. CVE-2024-10914CVE-2024-10914Public

    POC - CVE-2024–10914- Command Injection Vulnerability in `name` parameter for D-Link NAS

    PowerShell 45 12

  3. CVE-2024-23692CVE-2024-23692Public

    POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692

    Shell 42 16

  4. CVE-2024-4956CVE-2024-4956Public

    POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal

    Python 16 4

  5. CVE-2024-4358CVE-2024-4358Public

    Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024

    Python 12 5

  6. Hacking-Books-2024Hacking-Books-2024Public

    Top Hacking Books for 2024 (plus Resources): FREE and Paid

    28 13


[8]ページ先頭

©2009-2025 Movatter.jp