Skip to content
View Vulnpire's full-sized avatar
👾
../../../../../$(echo ${USER:0:2}.$(uname -n | cut -c1-4).127.0.0.1 | base64)
👾
../../../../../$(echo ${USER:0:2}.$(uname -n | cut -c1-4).127.0.0.1 | base64)

Block or report Vulnpire

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Vulnpire/README.md

💻 Tech Stack

AWS Bash PyTorch Flask Apache Burp Suite RedHat Amazon DynamoDB MySQL Python Ruby Kali Linux Wireshark Metasploit Ansible Powershell Django DigitalOcean Raspberry Pi Ubuntu Docker Cisco Arch Linux Rust Splunk Nginx Yarn npm Next.js JavaScript GraphQL Microsoft SQL Server GDB Langchain OSINT Impacket Active Directory Red Teaming Blue Teaming Snort Cisco Malware Nmap Exploit DB Ghidra Chromadb Amplify Nuclei Katana LLMs Finetuning

🕵🏻‍♂️ Profiles

TryHackMe Badge Hack The Box Badge

Pinned Loading

  1. Arsenal Arsenal Public

    Collection of tools, scripts, one-liners, templates, dorks and more

    Shell 5 1

  2. bounty-search-engine bounty-search-engine Public

    This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.

    JavaScript 10 3

  3. SSL-Hunter SSL-Hunter Public

    Python script for storing and querying SSL scan results and cloud IP ranges in MongoDB. Utilizes Flask for flexible API endpoints.

    Python 5

  4. wayfuzz wayfuzz Public

    Generate concise and targeted wordlists from Wayback Machine URLs

    Go 1

  5. cXtract cXtract Public

    Extracts hidden subdomains and IPs from cloud data

    Go

  6. sXtract sXtract Public

    Fetch IP addresses from Shodan search results.

    Go 1