Skip to content
View opsxcq's full-sized avatar
☢️
Testing...
☢️
Testing...

Organizations

@vulnerables @strm-containers @strm-exploits @strm-dev-containers @strm-samples @strm-mirrors @strm-ansible-roles @strm-reverse
Block or Report

Block or report opsxcq

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
opsxcq/README.md

OPSXCQ's profile

Bringing debauchery and anarchy back.

Pinned

  1. tasker tasker Public

    Tasker is a multipurpose task runner

    Java 187 19

  2. blog blog Public

    https://strm.sh website source code

    TeX 7 4

  3. exploit-CVE-2017-7494 exploit-CVE-2017-7494 Public

    SambaCry exploit and vulnerable container (CVE-2017-7494)

    C 369 99

  4. exploit-CVE-2016-10033 exploit-CVE-2016-10033 Public

    PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container

    PHP 395 150

  5. exploit-cve-2017-5715 exploit-cve-2017-5715 Public

    Spectre exploit

    C 54 19

  6. docker-vulnerable-dvwa docker-vulnerable-dvwa Public

    Damn Vulnerable Web Application Docker container

    PHP 198 217