Skip to content
View opsxcq's full-sized avatar
☢️
Testing...
☢️
Testing...

Organizations

@vulnerables @strm-containers @strm-exploits @strm-dev-containers @strm-samples @strm-mirrors @strm-ansible-roles @strm-reverse

Block or report opsxcq

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
opsxcq/README.md

OPSXCQ's profile

Bringing debauchery and anarchy back.

Pinned Loading

  1. tasker tasker Public

    Tasker is a multipurpose task runner

    Java 194 17

  2. blog blog Public

    https://strm.sh website source code

    TeX 9 4

  3. exploit-CVE-2017-7494 exploit-CVE-2017-7494 Public

    SambaCry exploit and vulnerable container (CVE-2017-7494)

    C 378 100

  4. exploit-CVE-2016-10033 exploit-CVE-2016-10033 Public

    PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container

    PHP 405 148

  5. exploit-cve-2017-5715 exploit-cve-2017-5715 Public

    Spectre exploit

    C 55 19

  6. docker-vulnerable-dvwa docker-vulnerable-dvwa Public

    Damn Vulnerable Web Application Docker container

    PHP 210 221