- Italy
-
00:54
(UTC +01:00) - edoardottt.com
- in/edoardoottavianelli
Highlights
Lists (2)
Sort Name ascending (A-Z)
Starred repositories
Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Discover new target domains using Content Security Policy
Search WiFi geolocation data by BSSID and SSID on different public databases.
RSC/Next.js RCE Vulnerability Detector & PoC Chrome Extension – CVE-2025-55182 & CVE-2025-66478
Hide your Powershell script in plain sight. Bypass all Powershell security features
Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
Master of Science in Cybersecurity, Sapienza University of Rome.
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.
CLI client (and Golang module) for deps.dev API. Free access to dependencies, licenses, advisories, and other critical health and security signals for open source package versions.
BloodyAD is an Active Directory Privilege Escalation Framework
Extract credentials from lsass remotely
Customized Password/Passphrase List inputting Target Info
Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.
My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.
Notes I took while preparing for eJPT certification by INE Security (passed 19/20, fka eLearn Security)
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by…
edoardottt / takeover
Forked from jaikishantulswani/takeoverSub-Domain TakeOver Vulnerability Scanner (edoardottt fork)
AirPods liberated from Apple's ecosystem.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more