Skip to content
View mr-r3bot's full-sized avatar
πŸ˜‹
Happy
πŸ˜‹
Happy

Block or report mr-r3bot

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mr-r3bot/README.md

Hi there πŸ‘‹

⚑ I'm R3bot, nickname is inspired by Mr Robot movie πŸ’¬.

🌱 I used to be a Web app Pentester, Vulnerability Researcher ( mostly Java and .NET web applications )

🌱 Now I'm a Offensive Security Researcher with a passionate for Malware and Windows internal, love to write offensive tools, mostly in C/C++ and assembly ( hopefully one day )

πŸ“« How to reach me:

Pinned Loading

  1. Gitlab-CVE-2021-22205 Gitlab-CVE-2021-22205 Public

    Python 183 44

  2. Proxyshell-Exchange Proxyshell-Exchange Public

    Poc script for ProxyShell exploit chain in Exchange Server

    Python 16 8

  3. WSO2-CVE-2022-29464 WSO2-CVE-2022-29464 Public

    Pre-auth RCE bug CVE-2022-29464

    Java 2 1

  4. Customized GetProcAddress and GetMod... Customized GetProcAddress and GetModuleHandle and handle redirected function with API hashing
    1
    UINT32 HashStringJenkinsOneAtATime32BitA(_In_ PCHAR String)
    2
    {
    3
    	SIZE_T Index = 0;
    4
    	UINT32 Hash = 0;
    5
    	SIZE_T Length = lstrlenA(String);
  5. Windows-Position-Independent-Shellcode Windows-Position-Independent-Shellcode Public

    C to assembly to shellcode ( Position independent shellcode )

    C 3

  6. bof-modules bof-modules Public

    BOF for C2 framework

    C 40 5