Skip to content
View thebinarychunk's full-sized avatar
Block or Report

Block or report thebinarychunk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
thebinarychunk/README.md
Cyber Security Professional | Hacker | Security Analyst.
Acknowledged by 30+ World Wide Companies.
For Private Invites: ethanabraham@wearehackerone.com
Founder & Head of Security at http://www.hackerspunk.com - The Comprehensive Cybersecurity Learning Platform
Monitoring your externally facing assets has never been easier!
For business inquiries: infosec@ethanabraham.com
  • Penetration testing methods. [OWASP Top 10 vulnerabilities]
  • Attack vectors. White/Gray/Black Box. [Web server, Web application, Service ports,...]
  • Web application vulnerabilities.
  • Privilege escalation techniques. [Windows, Linux and any other *nix]
  • Automated and manual web application vulnerability testing.
  • API vulnerabilities.
  • Cloud attacks and securing cloud networks. [AWS, Azure, Google cloud]
  • Network forensics.

Popular repositories

  1. Read.me Read.me Public

  2. AD-Config-Automation AD-Config-Automation Public

    Forked from kha1ifuzz/AD-Config-Automation

    Scripts and piece of codes used for Active Directory configuration

    PowerShell

  3. Villain Villain Public

    Forked from t3l3machus/Villain

    Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy…

    Python

  4. Mindmap Mindmap Public

    Forked from Ignitetechnologies/Mindmap

    This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them

  5. anomaly-detection-resources anomaly-detection-resources Public

    Forked from yzhao062/anomaly-detection-resources

    Anomaly detection related books, papers, videos, and toolboxes

    Python

  6. RedCloud-OS RedCloud-OS Public

    Forked from RedTeamOperations/RedCloud-OS

    RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers (CSPs)

    Shell