ly4k
Security Researcher
Funding Links: https://github.com/sponsors/ly4k
- Name: Oliver Lyak
- Location: Copenhagen, Denmark
- Company: IFCR
- Kind: user
- Followers: 1555
- Following: 0
- Total stars: 8034
- Repositories count: 15
- Created at: 2022-11-15T05:42:55.206Z
- Updated at: 2025-03-27T19:18:29.420Z
- Last synced at: 2025-03-27T19:18:29.420Z
GitHub Sponsors Profile
Hey there, I'm Oliver Lyak, a Danish pentester and security researcher with a passion for enterprise security.
One project I'm particularly proud of is Certipy, a widely used tool for attacking and auditing Active Directory Certificate Services. Additionally, I've had the opportunity to discover and report various vulnerabilities in Windows and Active Directory to Microsoft. You can read more about my research here.
Currently, I'm developing a new tool with a GUI specifically designed for pentesters taking on Azure. My dream is to make it the go-to tool in its category. User experience is a big deal to me, and I want to create a tool that's easy to use, intuitive, and enjoyable for everyone who uses it.
By sponsoring me, you'll help me invest more time into developing open-source tools and cover the costs involved in my research and development journey, such as CI/CD, licenses, subscriptions, and all that good stuff.
The community's support, whether through financial contributions or otherwise, is what drives and inspires me to keep pushing forward in my research and development endeavors. However, the costs associated with development and research can be quite significant.
I value your feedback and suggestions, so please don't hesitate to request new features or even propose ideas for new tools.
- Current Sponsors: 1
- Past Sponsors: 2
- Total Sponsors: 3
- Minimum Sponsorship: $5.00
Featured Works
fortra/impacket
Impacket is a collection of Python classes for working with network protocols.
Language: Python - Stars: 14101ly4k/Certipy
Tool for Active Directory Certificate Services enumeration and abuse
Language: Python - Stars: 2665ly4k/CurveBall
PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)
Language: Ruby - Stars: 887ly4k/PwnKit
Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation
Language: C - Stars: 1132ly4k/SpoolFool
Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)
Language: C# - Stars: 787ly4k/PassTheChallenge
Recovering NTLM hashes from Credential Guard
Language: C - Stars: 334Active Sponsors
Past Sponsors
Sponsor Breakdown
- User: 3