mpgn
̿ ̿̿'̿'\̵͇̿̿\=(•̪●)=/̵͇̿̿/'̿̿ ̿ ̿ ̿
Funding Links: https://github.com/sponsors/mpgn
- Location: France
- Kind: user
- Followers: 1258
- Following: 21
- Total stars: 3030
- Repositories count: 88
- Created at: 2022-11-06T20:06:24.164Z
- Updated at: 2025-03-09T19:16:53.800Z
- Last synced at: 2025-03-09T19:16:53.800Z
GitHub Sponsors Profile
Hello there ! I'm mpgn / @mpgn_x64 on twitter and I build or help to build tools around security / pentest ̿ ̿̿'̿'\̵͇̿̿=(•̪●)=/̵͇̿̿/'̿̿ ̿ ̿ ̿
During my free time, I develop CrackMapExec , I'm also the creator/contributors of many other security tools !
For my fellow french follower, I've also created a podcast called Hack'n Speak : https://anchor.fm/hacknspeak
All this work is done on my free time mostly during nigth time ! By becoming a sponsors you will help me to refill my reserve of coffee, helping me to update existing tools and create new ones !
Thank you all for the support ! 🪂
- Current Sponsors: 0
- Past Sponsors: 0
- Total Sponsors: 0
- Minimum Sponsorship: $10.00
Featured Works
LuccaSA/PingCastle-Notify
Monitor your PingCastle scans to highlight the rule diff between two scans
Language: PowerShell - Stars: 109mpgn/BackupOperatorToDA
From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller
Language: C++ - Stars: 417mpgn/Padding-oracle-attack
🔓 Padding oracle attack against PKCS7 🔓
Language: Python - Stars: 329mpgn/poodle-PoC
🐩 Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 🐩
Language: Python - Stars: 256mpgn/Rails-doubletap-RCE
RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)
Language: Ruby - Stars: 134