Skip to content
View pxcs's full-sized avatar
:shipit:
Id!ot who send Blood stained postcard
:shipit:
Id!ot who send Blood stained postcard

Organizations

@Convixum

Block or report pxcs

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. PasswordCracker PasswordCracker Public

    perform a ( hard-core ) force attack to get the correct credentials in under one minute, with the help of 𝗧𝗲𝗲𝘁𝗵 cybertooth && 𝗝𝗼𝗵𝗻 the Ripper. Fastest and most advanced password and logon cracking.…

    C 46 4

  2. BlackMarlinExec BlackMarlinExec Public

    Seven Degrees of Domain Admin

    C 54 15

  3. BreedHound BreedHound Public

    Forked from BloodHoundAD/SharpHound

    Data and exploit collector for SharpHound to BloodHound. This software will automatically determine what domain or directory the current user belongs to. ( BOF.NET )

    C# 74 9

  4. 7R0J4N 7R0J4N Public

    This malware is often used to form Botnets, enabling initial access for the Cyber Attacks Ransomware or Ryuk banking Trojan. 7R0J4N is developed and operated by a sophisticated group of malicious C…

    C 26 1

  5. WannaCry2.0 WannaCry2.0 Public

    𓆰𓆪 WannaCry 𝗿𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability exploit called 'EternalBlue'. The US National Security Agency ( NSA ) had developed this exploit, presumably for their own use

    C 38 6

  6. CrackMopExec CrackMopExec Public

    Forked from skelsec/kerberoast

    Kerberos Attacks, obtaining password hashes. 𝗖𝗿𝗮𝗰𝗸𝗠𝗼𝗽𝗘𝘅𝗲𝗰 focuses on the acquisition of TGS, specifically those related to services operating under user accounts in Active Directory.

    C 30 1