Skip to content
View RajChowdhury240's full-sized avatar
💻
just another learner
💻
just another learner
  • Confidential
  • $ aws sts get-caller-identity
  • 21:51 (UTC +11:00)

Organizations

@fossasia @CTF-Team-irNoobs @metis-os

Block or report RajChowdhury240

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Rajchowdhury240/README.md

Typing SVG

  • 🔭 I pretend to be a Cloud Engineer
  • 📜 OSCP+
  • 🏴‍☠️ C2 Development & Evasions
  • 🌱 Red Teaming & CTFs in free time
image

Pinned Loading

  1. ADCSDumper ADCSDumper Public

    An Automated tool leveraging Certipy & secretsdump.py to gain Domain Admin from Low Priv User

    Python 1

  2. PHP-8.1.0-dev-RCE PHP-8.1.0-dev-RCE Public

    PHP 8.1.0-dev RCE exploit

    Python 2

  3. tfswitch tfswitch Public

    Python Implementation of tfswitch utility to able to switch between versions of terraform on the go seamlessly

    Python 1

  4. CVE-2025-67435 CVE-2025-67435 Public

    A critical Remote Code Execution (RCE) vulnerability has been identified in PluXML CMS version 5.8.22. This vulnerability allows authenticated administrators to execute arbitrary PHP code on the we…

    1

  5. catrole catrole Public

    AWS IAM Role/Policy permission viewer — see what a role or policy can do.

    Python

  6. CVE-2025-67435-PoC CVE-2025-67435-PoC Public

    PluckCMS 4.7.20 Zip Slip vulnerability Led to RCE