Skip to content
View codexlynx's full-sized avatar
⚔️
root@inter.net:~#
⚔️
root@inter.net:~#

Organizations

@RadiOps
Block or Report

Block or report codexlynx

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned

  1. hardware-attacks-state-of-the-art hardware-attacks-state-of-the-art Public

    Microarchitectural exploitation and other hardware attacks.

    76 11

  2. frogd frogd Public

    Daemon for automatic jumping over 802.11 networks.

    Python 1 1

  3. systemd-rest systemd-rest Public

    ⚙️ A minimal HTTP REST interface for systemd.

    Go 4 1

  4. envoy-filter-log4shell envoy-filter-log4shell Public

    💉 Plugable Envoy WebAssembly L7 (HTTP) firewall to prevent log4shell vulnerability injections.

    Go 3

  5. brutemq brutemq Public

    💀 An exotic service bruteforce tool.

    Go 13 3

  6. CVE-2019-25024 CVE-2019-25024 Public

    Full exploit code for CVE-2019-25024 an unauthenticated command injection flaw in OpenRepeater.

    Python