Skip to content
View Shac0x's full-sized avatar
🐧
En un polo perdido...
🐧
En un polo perdido...

Block or report Shac0x

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Shac0x/README.md

πŸ‘½ About Me LinkedIn X

Python Rust C# C Bash Script PowerShell Nim

πŸ’» Pentester specializing in penetration testing, vulnerability identification, and securing systems against advanced threats.

πŸ” Discovered and reported: CVE-2023-3743 and CVE-2025-41064.

πŸ› οΈ I have a keen interest in malware development and bypassing defensive systems, and I enjoy exploring these areas to deepen my cybersecurity knowledge. This profile features my projects, scripts, and contributions related to pentesting and offensive security.

πŸƒβ€β™‚οΈ Outside of cybersecurity, I’m passionate about sports and playing video games.

πŸ’» Certifications & Trainings

OSEP OSCP CARTP CRTP eWPTX eCPT eJPT



Pinned Loading

  1. Wonka Wonka Public

    Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but for security research and penetration testing! 🎫

    C# 134 17

  2. Invoke-Totem Invoke-Totem Public

    Token impersonation in PowerShell to execute under the context of another user.

    PowerShell 22 1

  3. WebPastMachine WebPastMachine Public

    WebPastMachine is a powerful tool that lets you explore the history of any website through the Internet Archive's Wayback Machine.

    Python 2

  4. AutoReverseShell AutoReverseShell Public

    Shell 5 1