Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
@codexlynx
codexlynx
Follow
View codexlynx's full-sized avatar
⚔️
root@inter.net:~#

Eduardo González codexlynx

⚔️
root@inter.net:~#

Organizations

@RadiOps

Block or report codexlynx

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more aboutblocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more aboutreporting abuse.

Report abuse

PinnedLoading

  1. hardware-attacks-state-of-the-arthardware-attacks-state-of-the-artPublic

    Microarchitectural exploitation and other hardware attacks.

    95 12

  2. frogdfrogdPublic

    Daemon for automatic jumping over 802.11 networks.

    Python 1 1

  3. systemd-restsystemd-restPublic

    ⚙️ A minimal HTTP REST interface for systemd.

    Go 5 1

  4. envoy-filter-log4shellenvoy-filter-log4shellPublic

    💉 Plugable Envoy WebAssembly L7 (HTTP) firewall to prevent log4shell vulnerability injections.

    Go 3

  5. brutemqbrutemqPublic

    💀 An exotic service bruteforce tool.

    Go 13 3

  6. CVE-2019-25024CVE-2019-25024Public

    Full exploit code for CVE-2019-25024 an unauthenticated command injection flaw in OpenRepeater.

    Python


[8]ページ先頭

©2009-2025 Movatter.jp