Skip to content
View wh0amitz's full-sized avatar
🌴
On vacation
🌴
On vacation
Block or Report

Block or report wh0amitz

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
wh0amitz/README.md

WHOAMI

wh0amitz's github stats

PS C:\Users\whoami> whoami

I am just an ordinary student & offensive security researcher & hacker, and what I have learned basically comes from the information security community and my own research.

PS C:\Users\whoami> whoami /priv

  • Cyber Security: Web Security, Active Directory, Kerberos, Post Exploitation
  • Programmer: C/C++, C#, Python, JAVA, PHP, Nodejs.
  • CTF: Web.
  • Weapon: QSZ-92, Type 54 Pistol, NRP-9.

GitHub User's stars GitHub followers

Pinned Loading

  1. KRBUACBypass KRBUACBypass Public

    UAC Bypass By Abusing Kerberos Tickets

    C# 455 60

  2. PetitPotato PetitPotato Public

    Local privilege escalation via PetitPotam (Abusing impersonate privileges).

    C 394 51

  3. S4UTomato S4UTomato Public

    Escalate Service Account To LocalSystem via Kerberos

    C# 385 72

  4. BypassCredGuard BypassCredGuard Public

    Credential Guard Bypass Via Patching Wdigest Memory

    C++ 300 50

  5. SharpADWS SharpADWS Public

    Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).

    C# 415 40

  6. SharpRODC SharpRODC Public

    To audit the security of read-only domain controllers

    C# 106 7