Skip to content
View Kiosec's full-sized avatar
🥐
🥐
Block or Report

Block or report Kiosec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned

  1. External-Enumeration External-Enumeration Public

    External enumeration methodology for external pentest

    1 3

  2. Web-Exploitation Web-Exploitation Public

    Tips and methodologies to pentest the most common web services

    2 2

  3. Linux-Exploitation Linux-Exploitation Public

    Audit and pentest methodologies for Linux including internal enumeration, privesc, lateral movement, etc.

    3 2

  4. Shells Shells Public

    List of payloads: reverse shell, bind shell, webshell.

    15 4

  5. Windows-Exploitation Windows-Exploitation Public

    Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.

    2 2

  6. AD-Exploitation AD-Exploitation Public

    Audit and pentest methodologies for Active Directory including internal enumeration, privesc, lateral movement, etc.

    2 5