An open API service aggregating public data about GitHub Sponsors.

wetw0rk

View JSON Representation

John 3:16

Funding Links: https://github.com/sponsors/wetw0rk

GitHub Sponsors Profile

The Goal - World Domination
[Interviewer]
Yeah, yeah, that's cool
So what's like, I mean what's like
Your ultimate goal against in this in this industry?

[Method Man]
Domination, baby, fuck that

Table of Contents

Why Sponsor

Completed Projects
Ongoing Projects

Sponsor Perks

Why Sponsor
Ever since embarking on my hacking journey beginning with the OSCP. I have learned to be as effective as possible you must consume quality educational material. This is crucial, mission critical and absolutely necessary.
As I get older my goal is to provide information to the next generation of hackers that have a strong desire to dive into binary exploitation and true computer operations that can only be understood at the lowest level.
That said I want to bring you information that is easily digestible and worthy of your time. In return for sponsorship you will get:

Early access to any publications I will release on https://wetw0rk.github.io/
Early access to prep guides tailored to different courses (e.g AWAE-PREP)
Access to projects not yet open sourced (if ever)

Where will your money go?

Infrastructure
Hardware
Tooling

Completed Projects

AWAE-PREP

A guide containing subject matter I completed that allowed me to pass the OSWE certification. Unlike most guides I won't be throwing a bunch of links at you. EVERYTHING within this guide directly contributed to my success within the WEB-300 course.

MBE NOTES

A organized collection notes taken during my completion of the Modern Binary Exploitation course. This was released with permission of the original authors. That's right! A 300+ page guide that walks you through different attack techniques against the x86 architecture such as bypassing DEP and ASLR along with Heap and Kernel Exploitation. As an aside I heavily recommend their WarGames course which covers the x64 architecture and additional techniques not covered in MBE. Having spoken with the authors and being allowed to release the aforementioned PDF speaks volumes as to selecting them for future trainings. I will personally be taking their course as they release. You can find my review to WarGames on my Linkedin.

CA Unified Infrastructure Management Research

This was 0day research I conducted on the Nimsoft protocol. This repository contains all code created during the discovery of 3 0days. Two of which resulted in remote code execution. Within this repository you will find: a custom client created from reverse engineering the protocol, exploit code in C, an early release of a Metasploit module, and the fuzzer developed to find the 0days.

Ongoing Projects

Sickle

A payload development framework designed for modern environments. Long gone are the days of using malware and shellcode out of the box. With the ever changing landscape attackers are now creating custom tooling. Sickle aims to allow YOU the user the ability to evolve with attackers and leverage a framework to make custom payload development easier.

NDA NOT TODAY

This is a play on words, but I have ongoing projects that I plan to release however until complete I prefer not to speak! However, as a sponsor you will get exclusive access to these projects before released publicly - if ever.

Sponsor Perks
Sponsors will get access to source code not public and guides if applicable (e.g AWAE-PREP.pdf / Ezekiels Wheel). It's important note I will not assist in sharing existing course material out of moral code and respect for authors. As for code... what you do with it is not my responsibility and I often use the MIT License if you are concerned on code-reuse. However I do not condone or engage in illegal activity whatsoever.
Anything else, contact me!

Featured Works

wetw0rk/AWAE-PREP

This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with the AWAE course. This repo will likely contain custom code by…

Language: Java - Stars: 896
wetw0rk/Sickle

Payload Development Framework

Language: Python - Stars: 759
wetw0rk/Exploit-Development

CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002

Language: C - Stars: 67
wetw0rk/CA-UIM-Nimbus-Research

Vulnerability research on the CA UIM Nimbus protocol

Language: Python - Stars: 15