Skip to content
View opsxcq's full-sized avatar
☢️
Testing...
☢️
Testing...

Organizations

@vulnerables @strm-containers @strm-exploits @strm-dev-containers @strm-samples @strm-mirrors @strm-ansible-roles @strm-reverse

Block or report opsxcq

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact support about this user’s behavior. Learn more about reporting abuse.

Report abuse
opsxcq/README.md

OPSXCQ's profile

Bringing debauchery and anarchy back.

Pinned Loading

  1. taskertaskerPublic

    Tasker is a multipurpose task runner

    Java 198 17

  2. blogblogPublic

    https://strm.sh website source code

    TeX 10 4

  3. exploit-CVE-2017-7494exploit-CVE-2017-7494Public

    SambaCry exploit and vulnerable container (CVE-2017-7494)

    C 381 100

  4. exploit-CVE-2016-10033exploit-CVE-2016-10033Public

    PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container

    PHP 403 146

  5. exploit-cve-2017-5715exploit-cve-2017-5715Public

    Spectre exploit

    C 55 19

  6. docker-vulnerable-dvwadocker-vulnerable-dvwaPublic

    Damn Vulnerable Web Application Docker container

    PHP 215 224