Skip to content
View ex-cal1bur's full-sized avatar
🍀
Focusing
🍀
Focusing

Block or report ex-cal1bur

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. XSLT-Injection_reverse-shell XSLT-Injection_reverse-shell Public

    Demonstration of advanced exploitation using XSLT injection to achieve a reverse shell.

    XSLT 10 1

  2. SMB_CVE-2025-24071 SMB_CVE-2025-24071 Public

    Exploited CVE-2025-24071 via SMB by hosting a .library-ms file inside a .tar archive. Using tar x from smbclient, the payload is extracted server-side without user interaction. Responder captures t…

    Python 2 1

  3. Macro_revshell Macro_revshell Public

    Macro_revshell is an automation tool for penetration testing that generates malicious VBA macros that establish reverse shells using PowerShell and Powercat.

    PowerShell 3

  4. Excal1bur_Writeups Excal1bur_Writeups Public

    In this repository are the writeups of different machines that I have completed on the different CTF platforms.

    1

  5. CIF_Reverse_shell CIF_Reverse_shell Public

    File that can be used as an attack vector to execute a reverse shell on a vulnerable system. This CIF file is modified to contain a malicious payload embedded in its data structure, taking advantag…

  6. usbrubberducky-payloads usbrubberducky-payloads Public

    Forked from hak5/usbrubberducky-payloads

    The Official USB Rubber Ducky Payload Repository

    PowerShell