Skip to content
View 34zY's full-sized avatar
📦
Think outside of the box
📦
Think outside of the box
  • 1 = 1
  • 127.0.0.1

Block or report 34zY

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit Public

    CVE-2021-40444

    Ruby 66 24

  2. GitHarvest3r GitHarvest3r Public

    Simple CVE github exploit gathering tool written in python.

    Python 10

  3. Nerv0usR4bbit Nerv0usR4bbit Public

    Nerv0us r4bbit - Post Exploitation Windows Enumeration Tool

    Python 4 2

  4. CVE-2025-52970 CVE-2025-52970 Public

    CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit

    Python 7 2

  5. CVE-2017-6074-DOS CVE-2017-6074-DOS Public

    This repository provides a modified version of the original CVE-2017-6074 exploit (use-after-free in the Linux kernel DCCP subsystem), designed only to demonstrate Denial of Service (DoS) impact. A…

    C 1