The Wayback Machine - https://web.archive.org/web/20220620145256/https://github.com/WazeHell
Skip to content
Avatar
🎩
Going to release some tools soon ..
🎩
Going to release some tools soon ..
Block or Report

Block or report WazeHell

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
WazeHell/README.md

A Risk taker, good listener and competitive person facing limitations with good communication, focusing on security research Windows environment and various Adversary Emulation/Red Team techniques 💬 Ask me about Adversary Emulation/Red Team/PT/AWS/Python/AppSec

Languages

Python C++ C Django Lua C#

Technologies

AWS CI/CD Docker Jira Linux


Vincent's github stats


📫 How to reach me:

linkedin twitter

Pinned

  1. Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user

    Python 809 174

  2. Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab

    PowerShell 943 202

  3. LightMe Public

    HTTP Server serving obfuscated Powershell Scripts/Payloads

    PowerShell 82 16

  4. Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.

    PowerShell 98 19

  5. PE-Linux Public

    Linux Privilege Escalation Tool By WazeHell

    Shell 175 60

18 contributions in the last year

Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Mon Wed Fri

Contribution activity

June 2022

WazeHell has no activity yet for this period.