π» Investigating the world of Network Security, Digital Forensics, and Ethical Hacking
π± Learning: C++, Cybersecurity
β¨ Fun fact: I find vulnerabilities the same way Sherlock finds clues β with precision and style.
Pinned Loading
-
TheLeopard65/DockSleuth-Kit
TheLeopard65/DockSleuth-Kit PublicA Python-based Docker forensics framework designed for security analysts and incident responders to extract artifacts and reconstruct event timeline.
Python 1
-
TheLeopard65/Kernel-Ascent
TheLeopard65/Kernel-Ascent PublicA bash based Linux privilege escalation toolkit/script to scan, detect, automate and document linux privilege escalation exploitation.
Shell 1
-
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.


