Skip to content
View czeti's full-sized avatar

Block or report czeti

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. CVE-2024-48990_needrestart CVE-2024-48990_needrestart Public

    Exploit for CVE-2024-48990 - Privilege Escalation in Needrestart 3.7-3. For eductional purposes only

    Assembly 5 1

  2. asm_tracer asm_tracer Public

    Linux syscall tracing and supervision in Rust. Trap syscalls with seccomp, inspect/modify via hooks, and supervise child processes.

    Rust 1 1

  3. pic-implant pic-implant Public

    64-bit PIC reverse shell implant written in x64 NASM assembly for educational use only.

    Assembly

  4. baron-samedit baron-samedit Public

    This repository contains a Proof-of-Concept (PoC) exploit for the Baron Samedit vulnerability (CVE-2021-3156). The exploit demonstrates privilege escalation on Ubuntu 20.04 with sudo version 1.8.31…

    Assembly

  5. ten-ops ten-ops Public

    Config files for my GitHub profile.

  6. shamus shamus Public

    Deterministic Ethereum wallet recovery for partial BIP39 mnemonics. Brute‑force missing words with parallel CPU search, checkpointing, and a Rust CLI/library.

    Rust