Skip to content
View wh0amitz's full-sized avatar
🌴
On vacation
🌴
On vacation

Block or report wh0amitz

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
wh0amitz/README.md

WHOAMI

wh0amitz's github stats

PS C:\Users\whoami> whoami

I am just an ordinary student & offensive security researcher & hacker, and what I have learned basically comes from the information security community and my own research.

PS C:\Users\whoami> whoami /priv

  • Cyber Security: Web Security, Active Directory, Kerberos, Post Exploitation
  • Programmer: C/C++, C#, Python, JAVA, PHP, Nodejs.
  • CTF: Web.
  • Weapon: QSZ-92, Type 54 Pistol, NRP-9.

GitHub User's stars GitHub followers

Pinned Loading

  1. KRBUACBypass KRBUACBypass Public

    UAC Bypass By Abusing Kerberos Tickets

    C# 487 59

  2. PetitPotato PetitPotato Public

    Local privilege escalation via PetitPotam (Abusing impersonate privileges).

    C 414 51

  3. S4UTomato S4UTomato Public

    Escalate Service Account To LocalSystem via Kerberos

    C# 392 74

  4. BypassCredGuard BypassCredGuard Public

    Credential Guard Bypass Via Patching Wdigest Memory

    C++ 313 49

  5. SharpADWS SharpADWS Public

    Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).

    C# 494 53

  6. SharpRODC SharpRODC Public

    To audit the security of read-only domain controllers

    C# 114 8