Nothing Special   »   [go: up one dir, main page]

Skip to content
View crisprss's full-sized avatar
🥰
learning always
🥰
learning always

Block or report crisprss

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
crisprss/README.md

Yoo, I'm Crispr 👋

😄 I was a CTFer@天枢Dubhe and now a CTFer@白泽Whitzard, interested in WEB Security But a noob

🔭 I’m currently in Secsys of Fudan University. Worked as an intern at @chaitin. [Security Strategy Research Team] worked as an intern at @KeenLab [Web Security]

🌱 Bug hunting for Windows & Macos & Java web application

📫 How to reach me: https://crisprx.top

Crispr's GitHub stats

Top Langs

Pinned Loading

  1. RasmanPotato RasmanPotato Public

    Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do

    C 365 54

  2. BypassUserAdd BypassUserAdd Public

    通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化

    C++ 330 41

  3. magicNetdefs magicNetdefs Public

    Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged processes to access malicious pipes for exploitation

    C 49 5

  4. Extracted_WD_VDM Extracted_WD_VDM Public

    Windows Defender VDM lua collections

    Lua 44 12

  5. magicAzureAttestService magicAzureAttestService Public

    针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复

    C 2 1

  6. CVE-2024-44193 CVE-2024-44193 Public

    Forked from mbog14/CVE-2024-44193

    Hacking Windows through iTunes  - Local Privilege Escalation 0-day

    4