Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content
View 0xyg3n's full-sized avatar
💭
I have set myself to infinite loop please help.
💭
I have set myself to infinite loop please help.
  • 1337

Block or report 0xyg3n

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. SQL-PlayGRound SQL-PlayGRound Public

    A multi-DBMS SQL query lab for pentesters, developers, and researchers — featuring real engines (MySQL, PostgreSQL, MSSQL, Oracle, SQLite), live query execution, and a beautiful UI. Built with AI +…

    Python 2

  2. UAC_Exploit UAC_Exploit Public

    Escalate as Administrator bypassing the UAC affecting administrator accounts only.

    C# 252 63

  3. PEx64-Injector PEx64-Injector Public

    A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all operations performed in memory to evade antivirus detection.

    C# 202 43

  4. mem64 mem64 Public

    Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.

    Python 27 7

  5. DarkFender DarkFender Public

    Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)

    C# 35 16

  6. Prism Prism Public

    Installs to Current User your Global Root CA and also changes Windows Proxy Settings Silently.

    C# 7 11