Lautaro Colombo's starred repositories
bigipsecurity
This document describes common misconfigurations of F5 Networks BigIP systems.
WebHackersWeapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
hugo-theme-docdock
Declination of @matcornic Learn theme to Hugo
s3-buckets-finder
Find AWS S3 buckets and test their permissions.
hugo-theme-mini
A fast, minimalist and responsive hugo theme for bloggers.
evil-winrm
The ultimate WinRM shell for hacking/pentesting
VirtualHackingLabs
My experiences with Virtual Hacking Labs
Privilege-Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Penetration-Testing-Grimoire
Custom Tools and Notes from my own Penetration Testing Experience
awesome-oneliner-bugbounty
A collection of awesome one-liner scripts especially for bug bounty tips.
LemonBooster-v2
Reestructured LemonBooster.
the-book-of-secret-knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
git-secrets
Prevents you from committing secrets and credentials into git repositories
0xRick.github.io
Infosec blog
lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
EasyHook-Tutorials
Contains the source code for the EasyHook tutorials found at https://easyhook.github.io
TokenPlayer
Manipulating and Abusing Windows Access Tokens.
SUDO_KILLER
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.