🎯
Focusing
Security Researcher | Bug Bounty Hunter | Mechanical Engineer
-
PlanetSafe Cybersecurity
- 127.0.0.1
- https://linktr.ee/brutexploiter
- https://orcid.org/0009-0009-3722-2225
- @brutexploiter
Lists (27)
Sort Name ascending (A-Z)
Android Application Security
2 repositories
API Security
11 repositories
Artificial Intelligence (AI)
32 repositories
Automotive Security
Binary Exploitation
Blockchain Security
Browser Exploitation
1 repository
CI/CD Security
2 repositories
Cloud Security
5 repositories
CVE
3 repositories
Defensive Security
1 repository
Development
46 repositories
Digital Forensics
11 repositories
Exploit Development
Fuzzing
14 repositories
iOS Application Security
1 repository
IoT Security
Mobile Application Security
4 repositories
Mobile Security
1 repository
Network Security
1 repository
Offensive Security
20 repositories
OSINT
1 repository
Reconnaissance
32 repositories
Reverse Engineering
17 repositories
Vulnerability Research
2 repositories
Vulnerable Web Applications
1 repository
Web Application Security
63 repositories
Starred repositories
4
stars
written in CSS
Clear filter
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Accurately Locate Smartphones using Social Engineering
Automated & Manual Wordlists provided by Assetnote
Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and scripts have been written and published, but they can be cha…