Skip to content
View GabrielDuschl's full-sized avatar
Block or Report

Block or report GabrielDuschl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
GabrielDuschl/README.md

πŸ‘¨β€πŸ’» Gabriel Duschl - Penetration Testing & Red Teaming

πŸ›‘οΈ Exploring the World of Cyber Security πŸš€

πŸ‘‹ Hey there! I'm Gabriel, a dedicated cyber security enthusiast with a focus on Penetration Testing and Red Teaming.
I am currently in the process of obtaining my OSCP certification while actively advancing my knowledge in the fields of malware analysis and development.

🌐 Online Presence

πŸš€ My Journey

  • πŸ“š Currently learning about: Advanced Penetration Techniques, Red Team Operations
  • 🌟 Excited about: Applying Cyber Security Concepts to Real-world Scenarios

πŸ† TryHackMe Profile

TryHackMe

πŸ’¬ Contact

Feel free to connect with me on LinkedIn!


Pinned

  1. Automated-CME-Password-Spraying Automated-CME-Password-Spraying Public

    A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout Threshold and a Reset Account Lockout Counter.

    Python 14 2