Skip to content
View wh0amitz's full-sized avatar
🌴
On vacation
🌴
On vacation

Block or report wh0amitz

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
wh0amitz/README.md

whoami

Offensive Security Researcher  ·  Active Directory  ·  Post-Exploitation

stats top languages

Pinned Loading

  1. TailVNC TailVNC Public

    Tailscale-based Windows VNC persistence tool with Session 0 isolation bypass, embedding a full WireGuard peer and RFB server into a single drop-in binary.

    Go 271 28

  2. SharpADWS SharpADWS Public

    Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).

    C# 592 61

  3. S4UTomato S4UTomato Public

    Escalate Service Account To LocalSystem via Kerberos

    C# 404 78

  4. KRBUACBypass KRBUACBypass Public

    UAC Bypass By Abusing Kerberos Tickets

    C# 508 62

  5. PetitPotato PetitPotato Public

    Local privilege escalation via PetitPotam (Abusing impersonate privileges).

    C 460 56

  6. BypassCredGuard BypassCredGuard Public

    Credential Guard Bypass Via Patching Wdigest Memory

    C++ 337 53