Skip to content
View TheStingR's full-sized avatar

Block or report TheStingR

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. CVE-2025-68613-POC CVE-2025-68613-POC Public

    Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance.

    Python 9

  2. MCP-Ghidra5 MCP-Ghidra5 Public

    🎯 Advanced GPT-5 Powered Ghidra Reverse Engineering MCP Server | 7 AI-Enhanced Analysis Tools | Professional Binary Analysis | TechSquad Inc. Proprietary Software

    Python 6 1

  3. CVE-2025-25257 CVE-2025-25257 Public

    Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE

    Python 5 1

  4. CVE-2024-36991-Tool CVE-2024-36991-Tool Public

    This binary POC automates the exploitation of CVE-2024-36991 by sending crafted curl requests to a vulnerable Splunk instance. It retrieves sensitive files and saves them locally for further analys…

    2 1

  5. ReactOOPS-WriteUp ReactOOPS-WriteUp Public

    Hack The Box Writeup for Retired Challenge ReactOOPS - Complete solution and educational guide to CVE-2025-55182/CVE-2025-66478 (React2Shell RCE). Includes detailed vulnerability analysis, exploita…

    Shell 2

  6. MCP-Ghidra5-Windows MCP-Ghidra5-Windows Public

    🏢 Enterprise Windows Service for GPT-5 Powered Ghidra Reverse Engineering | Professional MSI Installer | PowerShell Management | Windows Security Integration

    PowerShell 1