Skip to content
View R0X4R's full-sized avatar
🔥
Wake. Eat. Hack. Repeat
🔥
Wake. Eat. Hack. Repeat

Block or report R0X4R

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
R0X4R/README.md

 

package main

import (
	"fmt"
)

type About map[string]string

func main() {
	for k, v := range GetAbout() {
		fmt.Printf("%+v: %+v\n", k, v)
	}
}

func GetAbout() About {
	return About{
	 "- About: I am a Cyber Security Enthusiast and a Hacker with an Ethical mindset. I'm having experience in Web-app security, Mobile app security, API security, Vulnerability Assessment & Penetration Testing.",
         "- Known Tools: I am experienced with tools like BurpSuite, acunetix, Nmap, and of course with Kali Linux & some GitHub open source tools like Amass, Aquatone, etc many more for finding the vulnerabilities in the web application and mobile application.", 
         "- Frequently: I have also made some scripts for the infosec community which helps beginners to find low-hanging bugs. I have frequently found account takeover, injections, privilege escalation, etc vulnerabilities on many programs.",
	}
}
$ ./experience
--------------------------------------------------------
I have secured over 60+ companies which includes some big tech companies like Google, Nokia, TripAdvisor, 
SAP Concour, Dell Technologies, Seagate, Mastercard, Netgear, and many more. Also I have 2 years 
experience in WordPress Development and Graphics Designing I have made 12+ websites using wordpress 
and also edit and make graphics as my side hobby.

gist/R0X4R

Social Media

Mostly used languages

Bash                     5 commits           ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓░░   94% 
Go                       1 commits           ░░░░░░░░░░░░░░░░░░░░   2.35%
Python                   0 commits           ░░░░░░░░░░░░░░░░░░░░   2%  
HTML                     3 commits           ░░░░░░░░░░░░░░░░░░░░   1% 
Others                   n commits           ░░░░░░░░░░░░░░░░░░░░   0.35%

Pinned Loading

  1. Garud Garud Public

    An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.

    Shell 777 178

  2. bhedak bhedak Public

    A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.

    Python 102 17

  3. A fast xss detector script A fast xss detector script
    1
    #!/bin/bash
    2
    #Requirements: KXSS(https://github.com/Emoe/kxss), Dalfox (https://github.com/hahwul/dalfox), QSreplace(https://github.com/tomnomnom/qsreplace)
    3
    #Preparation: subfinder -d target.tld -all -silent | httpx -silent | gauplus --random-agent -b eot,jpg,jpeg,gif,css,tif,tiff,png,ttf,otf,woff,woff2,ico,pdf,svg,txt -t 100 -o params.txt && cat params.txt | gf xss | sed "s/'/ /g" | sed "s/(/ /g" | sed "s/)/ /g" | qsreplace "FUZZ" 2> /dev/null | anew -q testparams.txt
    4
    #Usage: ./inxss.sh testparams.txt target.tld
    5
    lists=$1
  4. snetra snetra Public

    A Python based scanner uses shodan-internetdb to scan the IP.

    Python 30 5