Skip to content
View pevinkumar10's full-sized avatar
πŸ‘‹
πŸ‘‹

Organizations

@RevoltSecurities

Block or report pevinkumar10

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
pevinkumar10/README.md

πŸ’« About Me:

πŸ” Cyber Security Researcher
πŸ§‘β€πŸ’» Penetration Tester
πŸ‘‡πŸ½ Coding & Ethical Hacking Projects

πŸ’» Tech Stack:

Python Flask MySQL Docker

🌐 Socials:

LinkedIn

TryHackme profile:

Your TryHackMe Badge

πŸ“Š GitHub Stats:

Profile Stats Top Languages

πŸ† GitHub Trophies:


Pinned Loading

  1. CVE-2025-32463 CVE-2025-32463 Public

    Exploit for Local Privilege Escalation in Sudo via Malicious nsswitch.conf with sudo -R. (CVE-2025-32463)

    Python 2

  2. CVE-2025-47812 CVE-2025-47812 Public

    Exploit for CVE-2025-47812 with custom psudo shell and robust error handling.

    Python

  3. CTF-HUB CTF-HUB Public

    A Dockerized vulnerable web application designed as a Capture The Flag (CTF) challenge. Includes multiple real-world inspired security flaws for practicing web exploitation and learning secure codi…

    PHP

  4. Abandoned-Gate Abandoned-Gate Public

    It is a CTF challege to learn and practice chaining of three critical vulnerability like File upload to RCE to privilege escalation in a secured controlled environment (docker container).

    Hack 1

  5. CryptiHub CryptiHub Public

    This is a secure groupchat tool which contains encryption/decryption ,authentication and autherization.

    Python

  6. http-prober http-prober Public

    This is a simple async http probber to enumerate the statuscode of the url or list of urls.

    Python