Skip to content
View h4rithd's full-sized avatar
☠️
<script>alert('security is just an illusion');</script>
☠️
<script>alert('security is just an illusion');</script>

Block or report h4rithd

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

VulnStudio – Comprehensive Vulnerability Report Generation Tool

TypeScript 3 Updated Jun 3, 2025

Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

C 4,358 726 Updated Jul 8, 2025

Themes for Windows Terminal

TypeScript 1,463 81 Updated Nov 24, 2024

Simple reverse shell to avoid Win 11 defender detection

C++ 121 30 Updated Dec 21, 2021

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 12,423 1,465 Updated Sep 17, 2025

Reverse shell generator for HackTheBox written in 🖤#/bin/bash

Shell 8 3 Updated Mar 7, 2022

object serialization. ... “Pickling” is the process whereby a Python object hierarchy is converted into a byte stream, and “unpickling” is the inverse operation, whereby a byte stream is converted …

Python 1 2 Updated Aug 8, 2018

In cryptography, RC4 is a stream cipher. While remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure.

Python 1 2 Updated Sep 23, 2018

OAuth is an authorization framework that enables applications to obtain limited access to user accounts on an service, such as Facebook, GitHub, ect..

Java 1 1 Updated Dec 28, 2021

Cross-Site Request Forgery (CSRF) is a type of attack that occurs when a malicious web site, email, blog, instant message, or program causes a user's web browser to perform an unwanted action on a …

CSS 1 1 Updated Oct 11, 2018