Become a sponsor to mpgn
mpgn
Hello there ! I'm mpgn / @mpgn_x64 on twitter and I build or help to build tools around security / pentest ̿ ̿̿'̿'\̵͇̿̿=(•̪●)=/̵͇̿̿/'̿̿ ̿ ̿ ̿
During my free time, I develop CrackMapExec , I'm also the creator/contributors of many other security tools !
For my fellow french follower, I've also created a podcast called Hack'n Speak : https://anchor.fm/hacknspeak
All this work is done on my free time mostly during nigth time ! By becoming a sponsors you will help me to refill my reserve of coffee, helping me to update existing tools and create new ones !
Thank you all for the support ! 🪂
Featured work
-
LuccaSA/PingCastle-Notify
Monitor your PingCastle scans to highlight the rule diff between two scans
PowerShell 109 -
mpgn/BackupOperatorToDA
From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller
C++ 404 -
mpgn/Padding-oracle-attack
🔓 Padding oracle attack against PKCS7 🔓
Python 327 -
mpgn/poodle-PoC
🐩 Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 🐩
Python 251 -
mpgn/Rails-doubletap-RCE
RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)
Ruby 134
0% towards 5 monthly sponsors goal
Be the first to sponsor this goal!