Skip to content
View omershaik0's full-sized avatar
🎯
🎯

Block or report omershaik0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
omershaik0/README.md
  • 👋 Hi, I’m @omershaik0
  • 👀 I’m interested in CyberSecurity and CTF'S.
  • 🌱 I’m currently learning Python and Powershell scripting.
  • 🔥 I’m looking to collaborate on Pentesting scripts and much more.
  • 📫 How to reach me via ProtonMail unknown_exploit@protonmail.com or THM @unknownexploit.

Pinned Loading

  1. CVE-2023-36085_SISQUALWFM-Host-Header-Injection CVE-2023-36085_SISQUALWFM-Host-Header-Injection Public

    This repository contains information related CVE-2023-36085 a host header injection vulnerability discovered in SISQUALWFM version 7.1.319.103, which allows an attacker to manipulate webpage links …

  2. Gila-CMS-1.10.9-RCE-Authenticated Gila-CMS-1.10.9-RCE-Authenticated Public

    This Python script exploits the Gila CMS 1.10.9 vulnerability to achieve authenticated remote code execution (RCE). It uploads a shell, allowing arbitrary command execution on the target system. Th…

    Python

  3. Multithreaded_Port_Scanner Multithreaded_Port_Scanner Public

    This project is a multi-threaded port scanning tool written in Python. It scans a target IP/Domain for open ports using multiple threads to speed up the process.

    Python

  4. SAP-B1-ZedIT-Server-Exploit SAP-B1-ZedIT-Server-Exploit Public

    Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell

    Python