Skip to content
View safebuffer's full-sized avatar
🎩
Going to release some tools soon ..
🎩
Going to release some tools soon ..

Highlights

  • Pro

Block or report safebuffer

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
safebuffer/README.md

A Risk taker, good listener and competitive person facing limitations with good communication, focusing on security research Windows environment and various Adversary Emulation/Red Team techniques 💬 Ask me about Adversary Emulation/Red Team/AppSec/Blockchain

Languages

Python C++ C Django Lua C#

Technologies

AWS CI/CD Docker Jira Linux


Anurag's GitHub stats


📫 How to reach me:

X (formerly Twitter) Follow

Pinned Loading

  1. sam-the-admin sam-the-admin Public

    Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user

    Python 994 190

  2. vulnerable-AD vulnerable-AD Public

    Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab

    PowerShell 2k 391

  3. LightMe LightMe Public

    HTTP Server serving obfuscated Powershell Scripts/Payloads

    PowerShell 92 17

  4. cyberstruggle/chalumeau cyberstruggle/chalumeau Public

    Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.

    PowerShell 98 21

  5. PE-Linux PE-Linux Public

    Linux Privilege Escalation Tool

    Shell 180 61

  6. cyberstruggle/DeltaGroup cyberstruggle/DeltaGroup Public

    Lua 48 21