The Wayback Machine - https://web.archive.org/web/20201003232350/https://github.com/1N3
Skip to content
Avatar

Highlights

  • Arctic Code Vault Contributor
1N3/README.md

Website

Blog

Social Media

Bug Bounty Profiles

Public Exploits

Public Exploits/PoC's/CVE's/Bug Bounties/CTF's

2019 - Current:

XeroSecurity

  • Founded XeroSecurity which provides offensive security solutions to professional penetration testers, bug bounty researchers and enterprise security teams.

2018:

2017:

  • Recieved Offensive Security Certified Expert (OSCE) cerfication 12/2017
  • Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in WEMO HomeKit Bridge ($3,000 bounty) 9/2017
  • Stored Cross-Site Scripting (XSS) vulnerability in WEMO HomeKit Bridge ($500 bounty) 9/2017
  • Systemic Stored XSS vulnerability in WEMO HomeKit Android Application ($1,500 bounty) 9/2017
  • Systemic Local File Inclusion in DEMO HomeKit Android Application ($3,000 bounty) 9/2017
  • Placed 7th in ToorConCTF CTF 8/2017
  • Stored XSS in ModSecurity App for Splunk (Full Disclosure) 8/2017
  • Directory Traversal in PSPDFKit/Atlassian Jira Cloud Android application Bug Bounty 7/2017
  • Recieved Android Security For Penetration Testers (ASFP) certification from SecurityTube 5/2017
  • Gave talk at ISSA/OWASP Phoenix to 90+ attendees titled "Man In The Browser Advanced Client Side Exploitation" (https://www.slideshare.net/1N3/man-in-the-browser-advanced-client-side-exploitation-using-beef) 4/2017
  • PSV-2017-0227: Cross-Site Tracing Vulnerability in NETGEAR Arlo CVE 2/2017
  • Directory traversal + multiple CSRF + multiple stored and reflected XSS in NETGEAR M4300-8X8F switches ($3,000+ bounty) 3/2017
  • Recieved Department of Defense HackerOne Challenge coin for the Hack The Army Bug Bounty Program 2/2017
  • Listed on the BugCrowd 2016 MVP list 1/2017

2016:

2015:

2014:

Pinned

  1. Automated pentest framework for offensive security experts

    Shell 3.9k 1.2k

  2. A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.

    BitBake 2.4k 916

  3. Find exploits in local and online databases instantly

    Shell 1.1k 273

  4. A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.

    C 753 300

  5. Automatically brute force all services running on a target.

    Shell 863 343

  6. A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.

    Python 795 255

157 contributions in the last year

Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Mon Wed Fri
Activity overview
Contributed to 1N3/Sn1per, 1N3/BlackWidow, 1N3/BruteX and 5 other repositories
Loading

Contribution activity

October 2020

1N3 has no activity yet for this period.

September 2020

Created an issue in 1N3/Sn1per that received 17 comments

Command Execution Add-on returns no output

I am having the same issue, no results, no action, just he spinning blue circle. Originally posted by @GraylockInc in #281 (comment)

17 comments
You can’t perform that action at this time.