Skip to content
View Aureum01's full-sized avatar
πŸ’­
I may be slow to respond.
πŸ’­
I may be slow to respond.
Block or Report

Block or report Aureum01

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Aureum01/README.md
  • πŸ‘‹ Hi, I’m @Aureum01
  • πŸ‘€ I’m interested in criminology ...
  • ✌ VDP HackerOne participate
  • 🎁 TryHackMe
  • 🎁 HacktheBox
  • 🌱 I’m currently learning ASP.NET C#, SQL, Python, Bash, Ruby, Node JS, Java, Assembly, GoLang, Powershell and PHP ...
  • πŸ’žοΈ I’m looking to collaborate on Python, Powershell, SQL projects...

Pinned

  1. Powershell Powershell Public

    Trying my best with powershell using the docs and other resources, any critisism is necessary

    PowerShell 2

  2. SMapQL SMapQL Public

    SMapQL is a robust tool for detecting SQL Injection in sitemaps. It automates scanning of subdomains, identifies sitemaps, and tests for SQLi vulnerabilities. Designed for security researchers, it …

    Python 1 1

  3. CVE-2018-15473-Exploit CVE-2018-15473-Exploit Public

    Forked from Rhynorater/CVE-2018-15473-Exploit

    Exploit written in Python for CVE-2018-15473 with threading and export formats

    Python